{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:36:34Z","timestamp":1757543794146,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503987"},{"type":"electronic","value":"9783030503994"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_29","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"304-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Dynamic Instrumentation Technology for IoT Devices"],"prefix":"10.1007","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Weikong","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Wenting","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"issue":"10","key":"29_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MSPEC.2016.7572524","volume":"53","author":"A Nordrum","year":"2016","unstructured":"Nordrum, A.: The internet of fewer things [news]. IEEE Spectr. 53(10), 12\u201313 (2016)","journal-title":"IEEE Spectr."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A, Bos, H.: VUzzer: application-aware evolutionary fuzzing. In: Network and Distributed System Security Symposium, San Diego, CA, USA (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Karg\u00e9n, U., Shahmehri, N.: Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 782\u2013792 (2015)","DOI":"10.1145\/2786805.2786844"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Babi\u0107, D., Martignoni, L., McCamant, S., Song, D.: Statically-directed dynamic automated test generation. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis, Toronto, ON, Canada, 17\u201321 July 2011, pp. 12\u201322 (2011)","DOI":"10.1145\/2001420.2001423"},{"key":"29_CR5","unstructured":"Rebert, A., Cha, S.K., Avgerinos, T., Foote, J., Warren, D., Grieco, G. Brumley, D.: Optimizing seed selection for fuzzing. In: USENIX Security, San Diego, CA, USA, pp. 861\u2013875 (2014)"},{"key":"29_CR6","unstructured":"Pak, B.S.: Hybrid fuzz testing: discovering software bugs via fuzzing and symbolic execution. Master\u2019s thesis, Carnegie Mellon University (2012)"},{"issue":"6","key":"29_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1064978.1065036","volume":"40","author":"P Godefroid","year":"2005","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. SIGPLAN Not. 40(6), 213\u2013223 (2005)","journal-title":"SIGPLAN Not."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Avgerinos, T., Rebert, A., Cha, S.K., Brumley, D.: Enhancing symbolic execution with veritesting. In: Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India, pp. 1083\u20131094 (2014)","DOI":"10.1145\/2568225.2568293"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"H\u00f6schele, M., Zeller, A.: Mining input grammars from dynamic taints. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, Singapore, pp. 720\u2013725 (2016)","DOI":"10.1145\/2970276.2970321"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Woo, M., Brumley, D.: Program-adaptive mutational fuzzing. In: 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp. 725\u2013741 (2015)","DOI":"10.1109\/SP.2015.50"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing MAYHEM on binary code. In: 2012 IEEE Symposium on Security and Privacy, San Francisco, California, USA, pp. 380\u2013394 (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Chen, J., Diao, W., Zhao, Q., et al.: IoTFuzzer: discovering memory corruptions in IoT through app-based fuzzing. In: NDSS, San Diego, California, USA (2018)","DOI":"10.14722\/ndss.2018.23159"},{"key":"29_CR13","unstructured":"Nanda, S., Li, W., Lam, L.C., Chiueh, T.C.: Bird: binary interpretation using runtime disassembly. In: CGO, New York, NY, USA, pp. 358\u2013370 (2006)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Eustace, A., Eustace, A.: Atom: a system for building customized program analysis tools. In: PLDI, pp. 196\u2013205 (1994)","DOI":"10.1145\/773473.178260"},{"key":"29_CR15","unstructured":"Pani, P.: Measuring code coverage on an embedded target with highly limited resources. Master\u2019s thesis, Graz University of Technology (2014)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Laurenzano, M.A., Tikir, M.M., Carrington, L., Snavely, A.: Pebil: efficient static binary instrumentation for Linux. In: ISPASS, White Plains, NY, USA, pp. 175\u2013183 (2010)","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"CK Luk","year":"2005","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. ACM SIGPLAN Not. 40, 190\u2013200 (2005)","journal-title":"ACM SIGPLAN Not."},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Not. 42, 89\u2013100 (2007)","journal-title":"ACM SIGPLAN Not."},{"key":"29_CR19","unstructured":"Bruening, D.: DynamoRIO: Dynamic Instrumentation Tool Platform. \nhttp:\/\/www.dynamorio.org\/"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., Balzarotti, D.: What you corrupt is not what you crash: challenges in fuzzing embedded devices. In: NDSS, San Diego, CA, USA (2018)","DOI":"10.14722\/ndss.2018.23166"},{"issue":"7","key":"29_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2007477.1952688","volume":"46","author":"Q Zhao","year":"2011","unstructured":"Zhao, Q., Koh, D., Raza, S., Bruening, D., Wong, W., Amarasinghe, S.: Dynamic cache contention detection in multi-threaded applications. ACM SIGPLAN Not. 46(7), 27\u201338 (2011)","journal-title":"ACM SIGPLAN Not."},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Nagy, S., Hicks, M.: Full-speed fuzzing: reducing fuzzing overhead through coverage-guided tracing. In: IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 787\u2013802 (2019)","DOI":"10.1109\/SP.2019.00069"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"She, D., Pei, K., Epstein, D., et al.: NEUZZ: efficient fuzzing with neural program smoothing. In: IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 803\u2013817 (2019)","DOI":"10.1109\/SP.2019.00052"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Srivastava, P., Peng, H., Li, J., et al.: FirmFuzz: automated IoT firmware introspection and analysis. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, London, UK, pp. 15\u201321 (2019)","DOI":"10.1145\/3338507.3358616"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Gan, S., Zhang, C., Qin, X., et al.: Collafl: path sensitive fuzzing. In: IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 679\u2013696 (2018)","DOI":"10.1109\/SP.2018.00040"},{"key":"29_CR26","unstructured":"Capstone. \nhttp:\/\/www.capstone-engine.org"},{"key":"29_CR27","unstructured":"Srivastava, A., Edwards, A., Vo, H.: Vulcan: binary transformation in a distributed environment. Technical report, MSR-TR-2001-50, Microsoft Research (2001)"},{"key":"29_CR28","unstructured":"Cantrill, B., Shapiro, M.W., Leventhal, A.H.: Dynamic instrumentation of production systems. In: USENIX Annual Technical Conference, Boston Marriott Copley Place, Boston, MA, USA, pp. 15\u201328 (2004)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:27:34Z","timestamp":1591702054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}