{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:50:41Z","timestamp":1773316241153,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562084","type":"print"},{"value":"9789819562091","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6209-1_16","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:27:02Z","timestamp":1767320822000},"page":"291-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SeqFuzz: Efficient Kernel Directed Fuzzing via\u00a0Effective Component Inference"],"prefix":"10.1007","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tingke","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jiacheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yanlin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huimin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zulie","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"16_CR1","unstructured":"American fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Nguyen, M.D., Roychoudhury, A.: Directed greybox fuzzing. In: The Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2329\u20132344 (2017)","DOI":"10.1145\/3133956.3134020"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., et al.: Hawkeye: towards a desired directed grey-box fuzzer. In: The Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2095\u20132108 (2018)","DOI":"10.1145\/3243734.3243849"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., et al.: SyzGen++: dependency inference for augmenting kernel driver fuzzing. In: The Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 4661\u20134677 (2024)","DOI":"10.1109\/SP54263.2024.00269"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Coppik, N., Schwahn, O., Suri, N.: MEMFUZZ: using memory accesses to guide fuzzing. In: The Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp. 48\u201358 (2019)","DOI":"10.1109\/ICST.2019.00015"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Corina, J., et al.: DIFUZE: interface aware fuzzing for kernel drivers. In: The Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2123\u20132138 (2017)","DOI":"10.1145\/3133956.3134069"},{"key":"16_CR7","unstructured":"Fleischer, M., et al.: Actor: action-guided kernel fuzzing. In: The Proceedings of the 32nd USENIX Security Symposium (USENIX Security), pp. 5003\u20135020 (2023)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Gan, S., et al.: CollAFL: path sensitive fuzzing. In: The Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), pp. 679\u2013696 (2018)","DOI":"10.1109\/SP.2018.00040"},{"key":"16_CR9","unstructured":"Google: syzkaller\/docs\/syscall_descriptions_syntax.md at master $$\\cdot $$ google\/syzkaller. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/syscall_descriptions_syntax.md"},{"key":"16_CR10","unstructured":"Google: syzkaller - kernel fuzzer (2023). https:\/\/github.com\/google\/syzkaller"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Han, H., Cha, S.K.: IMF: inferred model-based fuzzer. In: The Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2345\u20132358 (2017)","DOI":"10.1145\/3133956.3134103"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Huang, H., Guo, Y., Shi, Q., Yao, P., Wu, R., Zhang, C.: BEACON: directed grey-box fuzzing with provable path pruning. In: The Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), pp. 36\u201350 (2022)","DOI":"10.1109\/SP46214.2022.9833751"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J., Yun, J.: Poster: directed hybrid fuzzing on binary code. In: The Proceedings of the 19th ACM SIGSAC Conference on Computer and Communications Security, pp. 2637\u20132639 (2019)","DOI":"10.1145\/3319535.3363275"},{"key":"16_CR14","unstructured":"Kim, T.E., Choi, J., Heo, K., Cha, S.K.: DAFL: directed grey-box fuzzing guided by data dependency. In: The 32nd USENIX Security Symposium (USENIX Security), pp. 4931\u20134948 (2023)"},{"key":"16_CR15","unstructured":"Kim, T., et al.: RVFuzzer: finding input validation bugs in robotic vehicles through control-guided testing. In: The Proceedings of the 28th USENIX Security Symposium (USENIX Security), pp. 425\u2013442 (2019)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Yesterday once more: facilitating Linux kernel bug reproduction via reverse fuzzing. IEEE Trans. Inf. Forensics Secur. (2025)","DOI":"10.1109\/TIFS.2025.3562704"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TDSC.2023.3244825","volume":"21","author":"Y Li","year":"2023","unstructured":"Li, Y., et al.: G-fuzz: a directed fuzzing framework for gVisor. IEEE Trans. Dependable Secure Comput. 21(1), 168\u2013185 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Liang, H., Zhang, Y., Yu, Y., Xie, Z., Jiang, L.: Sequence coverage directed greybox fuzzing. In: The Proceedings of the 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp. 249\u2013259 (2019)","DOI":"10.1109\/ICPC.2019.00044"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Liao, C., Wang, R., Li, Y., Chen, J., Li, Y., Pan, Z.: SyzLego: enhancing kernel directed greybox fuzzing via dependency inference and scheduling. In: The Proceedings of the 39th International Conference on Information Security (ISC), pp. 171\u2013189 (2024)","DOI":"10.1007\/978-3-031-75757-0_9"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Lin, P., Wang, P., Zhou, X., Xie, W., Zhang, G., Lu, K.: DeepGo: predictive directed greybox fuzzing. In: The Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS) (2024)","DOI":"10.14722\/ndss.2024.24514"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Luo, C., Meng, W., Li, P.: SelectFuzz: efficient directed fuzzing with selective path exploration. In: The Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), pp. 2693\u20132707. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179296"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Lyu, C., et al.: SLIME: program-sensitive energy allocation for fuzzing. In: The Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp. 365\u2013377 (2022)","DOI":"10.1145\/3533767.3534385"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Mathis, B., Gopinath, R., Mera, M., Kampmann, A., H\u00f6schele, M., Zeller, A.: Parser-directed fuzzing. In: The Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 548\u2013560 (2019)","DOI":"10.1145\/3314221.3314651"},{"key":"16_CR24","unstructured":"Nguyen, M.D., Bardin, S., Bonichon, R., Groz, R., Lemerre, M.: Binary-level directed fuzzing for use-after-free vulnerabilities. In: The Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 47\u201362 (2020)"},{"key":"16_CR25","unstructured":"Pailoor, S., Aday, A., Jana, S.: MoonShine: optimizing OS fuzzer seed selection with trace distillation. In: The Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018), pp. 729\u2013743 (2018)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Peng, J., et al.: 1dVul: discovering 1-day vulnerabilities through binary patches. In: The Proceedings of the 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 605\u2013616 (2019)","DOI":"10.1109\/DSN.2019.00066"},{"key":"16_CR27","unstructured":"Sun, H., Shen, Y., Liu, J., Xu, Y., Jiang, Y.: KSG: augmenting kernel fuzzing with system call specification generation. In: The Proceedings of the 22nd USENIX Annual Technical Conference (USENIX ATC 2022), pp. 351\u2013366 (2022)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Sun, H., et al.: Healer: relation learning guided kernel fuzzing. In: The Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (SOSP), pp. 344\u2013358 (2021)","DOI":"10.1145\/3477132.3483547"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Tan, X., Zhang, Y., Lu, J., Xiong, X., Liu, Z., Yang, M.: SyzDirect: directed greybox fuzzing for Linux Kernel. In: the Proceedings of the 31st ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1630\u20131644 (2023)","DOI":"10.1145\/3576915.3623146"},{"key":"16_CR30","unstructured":"Wang, D., Zhang, Z., Zhang, H., Qian, Z., Krishnamurthy, S.V., Abu-Ghazaleh, N.: SyzVegas: beating kernel fuzzing odds with reinforcement learning. In: The Proceedings of the 30th USENIX Security Symposium (USENIX Security), pp. 2741\u20132758 (2021)"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Typestate-guided fuzzer for discovering use-after-free vulnerabilities. In: The Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering (ICSE), pp. 999\u20131010 (2020)","DOI":"10.1145\/3377811.3380386"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Wen, C., et al.: MEMLOCK: memory usage guided fuzzing. In: The Proceedings of the 42nd International Conference on Software Engineering (ICSE), pp. 765\u2013777 (2020)","DOI":"10.1145\/3377811.3380396"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Wen, T., Li, Y., Zhang, L., Ma, H., Pan, Z.: An empirical study on the distance metric in guiding directed grey-box fuzzing. In: The Proceedings of the 35th International Symposium on Software Reliability Engineering (ISSRE), pp. 307\u2013318 (2024)","DOI":"10.1109\/ISSRE62328.2024.00038"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Xu, J., et al.: MOCK: optimizing kernel fuzzing mutation with context-aware dependency. In: The 31st Annual Network and Distributed System Security Symposium (NDSS 2024) (2024)","DOI":"10.14722\/ndss.2024.23131"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Yang, C., Zhao, Z., Zhang, L.: KernelGPT: enhanced kernel fuzzing via large language models. In: The Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), vol.\u00a02, pp. 560\u2013573 (2025)","DOI":"10.1145\/3676641.3716022"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"You, W., et al.: SemFuzz: semantics-based automatic generation of proof-of-concept exploits. In: The Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2139\u20132154 (2017)","DOI":"10.1145\/3133956.3134085"},{"key":"16_CR37","unstructured":"Yue, T., et al.: EcoFuzz: adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In: The Proceedings of the 29th USENIX Security Symposium (USENIX Security), pp. 2307\u20132324 (2020)"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhu, X., Xiao, X., Xue, M., Zhang, C., Wen, S.: SHAPFUZZ: efficient fuzzing via Shapley-guided byte selection (2024)","DOI":"10.14722\/ndss.2024.23134"},{"key":"16_CR39","unstructured":"Zhao, B., et al.: StateFuzz: system call-based state-aware Linux driver fuzzing. In: The Proceedings of the 31st USENIX Security Symposium (USENIX Security), pp. 3273\u20133289 (2022)"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Li, Y., Yang, T., Xie, H.: Suzzer: a vulnerability-guided fuzzer based on deep learning. In: The Proceedings of the 15th International Conference on Information Security and Cryptology (Inscrypt), pp. 134\u2013153 (2019)","DOI":"10.1007\/978-3-030-42921-8_8"},{"key":"16_CR41","unstructured":"Zong, P., Lv, T., Wang, D., Deng, Z., Liang, R., Chen, K.: FuzzGuard: filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In: The Proceedings of the 29th USENIX Security Symposium (USENIX Security), pp. 2255\u20132269 (2020)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6209-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:46:04Z","timestamp":1773251164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6209-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562084","9789819562091"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6209-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}