{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:34Z","timestamp":1761812914910,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_5","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:28Z","timestamp":1761812608000},"page":"89-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EvoFuzz: Enhancing State Space Exploration and\u00a0Seed Prioritization in\u00a0Stateful Protocol Fuzzing Using Evolutionary Game Theory"],"prefix":"10.1007","author":[{"given":"Chengdong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"5_CR1","unstructured":"Ba, J., B\u00f6hme, M., Mirzamomen, Z., Roychoudhury, A.: Stateful greybox fuzzing. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 3255\u20133272 (2022)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1032\u20131043 (2016)","DOI":"10.1145\/2976749.2978428"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Borcherding, A., Giraud, M., Fitzgerald, I., Beyerer, J.: The bandit\u2019s states: modeling state selection for stateful network fuzzing as multi-armed bandit problem. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 345\u2013350. IEEE (2023)","DOI":"10.1109\/EuroSPW59978.2023.00043"},{"issue":"24","key":"5_CR4","doi-asserted-by":"publisher","first-page":"4962","DOI":"10.3390\/electronics13244962","volume":"13","author":"M Cheng","year":"2024","unstructured":"Cheng, M., Zhu, K., Chen, Y., Lu, Y., Chen, C., Yu, J.: Reinforcement learning-based multi-phase seed scheduling for network protocol fuzzing. Electronics 13(24), 4962 (2024)","journal-title":"Electronics"},{"issue":"9","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3648468","volume":"56","author":"C Daniele","year":"2024","unstructured":"Daniele, C., Andarzian, S.B., Poll, E.: Fuzzers for stateful systems: survey and research directions. ACM Comput. Surv. 56(9), 1\u201323 (2024)","journal-title":"ACM Comput. Surv."},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103851","volume":"142","author":"P Lin","year":"2024","unstructured":"Lin, P., Wang, P., Zhou, X., Xie, W., Lu, K., Zhang, G.: Hypergo: probability-based directed hybrid fuzzing. Comput. Secur. 142, 103851 (2024)","journal-title":"Comput. Secur."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Liu, D., Pham, V.T., Ernst, G., Murray, T., Rubinstein, B.I.: State selection algorithms and their impact on the performance of stateful network protocol fuzzing. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 720\u2013730. IEEE (2022)","DOI":"10.1109\/SANER53432.2022.00089"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Luo, S., Herrera, A., Quirk, P., Chase, M., Ranasinghe, D.C., Kanhere, S.S.: Make out like a (multi-armed) bandit: improving the odds of fuzzer seed scheduling with t-scheduler. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1463\u20131479 (2024)","DOI":"10.1145\/3634737.3637639"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Meng, R., Mirchev, M., B\u00f6hme, M., Roychoudhury, A.: Large language model guided protocol fuzzing. In: Proceedings of the 31st Annual Network and Distributed System Security Symposium (NDSS), vol.\u00a02024 (2024)","DOI":"10.14722\/ndss.2024.24556"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Meng, R., Pham, V.T., B\u00f6hme, M., Roychoudhury, A.: Aflnet five years later: on coverage-guided protocol fuzzing. IEEE Trans. Softw. Eng. (2025)","DOI":"10.1109\/TSE.2025.3535925"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Mou, Y., Wang, B., Yu, B., Yang, Q.: Scfuzz: complexity aware state selection algorithm for network protocol fuzzing. In: GLOBECOM 2024-2024 IEEE Global Communications Conference, pp. 1203\u20131208. IEEE (2024)","DOI":"10.1109\/GLOBECOM52923.2024.10901240"},{"issue":"7","key":"5_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10664-022-10233-3","volume":"27","author":"R Natella","year":"2022","unstructured":"Natella, R.: Stateafl: greybox fuzzing for stateful network servers. Empir. Softw. Eng. 27(7), 191 (2022)","journal-title":"Empir. Softw. Eng."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Natella, R., Pham, V.T.: Profuzzbench: a benchmark for stateful protocol fuzzing. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 662\u2013665 (2021)","DOI":"10.1145\/3460319.3469077"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Now\u00e9, A., Vrancx, P., De\u00a0Hauwere, Y.M.: Game theory and multi-agent reinforcement learning. In: Reinforcement Learning: State-of-the-Art, pp. 441\u2013470. Springer (2012)","DOI":"10.1007\/978-3-642-27645-3_14"},{"issue":"2","key":"5_CR15","first-page":"26","volume":"12","author":"J Park","year":"2023","unstructured":"Park, J., Adams, H.: Evolutionary game theory for dynamic resource allocation in wireless networks. Int. J. Adv. Comput. Theory Eng. 12(2), 26\u201332 (2023)","journal-title":"Int. J. Adv. Comput. Theory Eng."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Pham, V.T., B\u00f6hme, M., Roychoudhury, A.: Aflnet: a greybox fuzzer for network protocols. In: 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST), pp. 460\u2013465. IEEE (2020)","DOI":"10.1109\/ICST46399.2020.00062"},{"issue":"6","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3580598","volume":"32","author":"S Qin","year":"2023","unstructured":"Qin, S., Hu, F., Ma, Z., Zhao, B., Yin, T., Zhang, C.: Nsfuzz: towards efficient and state-aware network service fuzzing. ACM Trans. Softw. Eng. Methodol. 32(6), 1\u201326 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-01680-6_32","volume-title":"Trustworthy Software Development Processes","author":"V Sazawal","year":"2009","unstructured":"Sazawal, V., Sudan, N.: Modeling software evolution with game theory. In: Wang, Q., Garousi, V., Madachy, R., Pfahl, D. (eds.) ICSP 2009. LNCS, vol. 5543, pp. 354\u2013365. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01680-6_32"},{"issue":"14","key":"5_CR19","doi-asserted-by":"publisher","first-page":"R503","DOI":"10.1016\/S0960-9822(99)80321-2","volume":"9","author":"K Sigmund","year":"1999","unstructured":"Sigmund, K., Nowak, M.A.: Evolutionary game theory. Curr. Biol. 9(14), R503\u2013R505 (1999)","journal-title":"Curr. Biol."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Tanimoto, J.: Fundamentals of evolutionary game theory and its applications. Springer (2015)","DOI":"10.1007\/978-4-431-54962-8"},{"issue":"1876","key":"5_CR21","doi-asserted-by":"publisher","first-page":"20210508","DOI":"10.1098\/rstb.2021.0508","volume":"378","author":"A Traulsen","year":"2023","unstructured":"Traulsen, A., Glynatsi, N.E.: The future of theoretical evolutionary game theory. Philos. Trans. R. Soc. B 378(1876), 20210508 (2023)","journal-title":"Philos. Trans. R. Soc. B"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1613\/jair.1.16146","volume":"82","author":"MP Wellman","year":"2025","unstructured":"Wellman, M.P., Tuyls, K., Greenwald, A.: Empirical game theoretic analysis: a survey. J. Artif. Intell. Res. 82, 1017\u20131076 (2025)","journal-title":"J. Artif. Intell. Res."},{"issue":"24","key":"5_CR23","doi-asserted-by":"publisher","first-page":"13172","DOI":"10.3390\/app132413172","volume":"13","author":"C Xie","year":"2023","unstructured":"Xie, C., Jia, P., Yang, P., Hu, C., Kuang, H., Ye, G., Hong, X.: Not all seeds are important: fuzzing guided by untouched edges. Appl. Sci. 13(24), 13172 (2023)","journal-title":"Appl. Sci."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Yu, L., Yanlong, S., Ying, Z.: Stateful protocol fuzzing with statemap-based reverse state selection. arXiv preprint arXiv:2408.06844 (2024)","DOI":"10.2139\/ssrn.5170890"},{"key":"5_CR25","unstructured":"Yue, T., et al.: Ecofuzz: adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 2307\u20132324 (2020)"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0296374","volume":"19","author":"G Zhang","year":"2024","unstructured":"Zhang, G., Bi, S.: Evolutionary game analysis of online game studios and online game companies participating in the virtual economy of online games. PLoS ONE 19(1), e0296374 (2024)","journal-title":"PLoS ONE"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhu, X., Xiao, X., Xue, M., Zhang, C., Wen, S.: Shapfuzz: efficient fuzzing via shapley-guided byte selection. arXiv preprint arXiv:2308.09239 (2023)","DOI":"10.14722\/ndss.2024.23134"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:36Z","timestamp":1761812616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}