{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:56Z","timestamp":1763507696900,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336923"},{"type":"electronic","value":"9783319336930"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33693-0_27","type":"book-chapter","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T05:35:47Z","timestamp":1464068147000},"page":"425-438","source":"Crossref","is-referenced-by-count":4,"title":["Fuzzing JavaScript Engine APIs"],"prefix":"10.1007","author":[{"given":"Ren\u00e1ta","family":"Hodov\u00e1n","sequence":"first","affiliation":[]},{"given":"\u00c1kos","family":"Kiss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"key":"27_CR1","unstructured":"Anderson, C.L.: Type inference for JavaScript. Ph.D. thesis, University of London, Imperial College London, Department of Computing (2006)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Chugh, R., Herman, D., Jhala, R.: Dependent types for JavaScript. In: Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA 2012), pp. 587\u2013606. ACM (2012)","DOI":"10.1145\/2384616.2384659"},{"key":"27_CR3","unstructured":"Ecma International: ECMAScript Language Specification (ECMA-262), 5.1st edn., June 2011"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Franzen, D., Aspinall, D.: Towards an amortized type system for JavaScript. In: Proceedings of the 6th International Symposium on Symbolic Computation in Software Science (SCSS 2014). EPiC Series in Computer Science, vol. 30, pp. 12\u201326. EasyChair (2014)","DOI":"10.29007\/v2f2"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. In: Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2008), pp. 206\u2013215. ACM (2008)","DOI":"10.1145\/1375581.1375607"},{"key":"27_CR6","unstructured":"Holler, C., Herzig, K., Zeller, A.: Fuzzing with code fragments. In: 21st USENIX Security Symposium, pp. 445\u2013458. USENIX (2012)"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/978-3-642-03237-0_17","volume-title":"Static Analysis","author":"SH Jensen","year":"2009","unstructured":"Jensen, S.H., M\u00f8ller, A., Thiemann, P.: Type analysis for JavaScript. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol. 5673, pp. 238\u2013255. Springer, Heidelberg (2009)"},{"key":"27_CR8","unstructured":"Microsoft Corporation: Security development lifecycle (verification phase). https:\/\/www.microsoft.com\/en-us\/sdl\/default.aspx"},{"issue":"3","key":"27_CR9","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/BF01932308","volume":"12","author":"P Purdom","year":"1972","unstructured":"Purdom, P.: A sentence generator for testing parsers. BIT Numer. Math. 12(3), 366\u2013375 (1972)","journal-title":"BIT Numer. Math."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Sen, K., Kalasapur, S., Brutch, T., Gibbs, S.: Jalangi: A selective record-replay and dynamic analysis framework for JavaScript. In: Proceedings of the 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE 2013), pp. 488\u2013498. ACM (2013)","DOI":"10.1145\/2491411.2491447"},{"key":"27_CR11","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley, Boston (2007)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Takanen, A., DeMott, J., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance, chap. Foreword, Artech House (2008)","DOI":"10.1016\/S1353-4858(08)70095-3"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/978-3-540-31987-0_28","volume-title":"Programming Languages and Systems","author":"P Thiemann","year":"2005","unstructured":"Thiemann, P.: Towards a type system for analyzing JavaScript programs. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 408\u2013422. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33693-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T19:06:10Z","timestamp":1748977570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33693-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336923","9783319336930"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33693-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}