[1] https://www.coinfabrik.com/blog/why-the-fuzz-about-fuzzing-c...
[2] https://www.coinfabrik.com/blog/fireblocks-api-black-box-rev...
Based on your description and the overlap in authors, LangFuzz, as presented in the paper, seems to match quite close. Roughly summarizing a few paragraphs of the paper, they mainly used a mutational approach (e.g. modifying already found/generated "inputs") after a learning phase where sample files are processed and their grammar discovered (section 3.1 in [2]). This leads to code fragments that are syntactically correct, but might be semantically incorrect (see section 3.3 in [2])
Another fuzzer (albeit more recently in time) that has found numerous vulnerabilities is afl-fuzz, or "american fuzzy lop"[3].
[0] https://www.squarefree.com/2007/08/02/introducing-jsfunfuzz/
[1] https://blog.mozilla.org/security/2007/08/02/javascript-fuzz...
[2] [PDF] https://www.usenix.org/system/files/conference/usenixsecurit...