{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:57:03Z","timestamp":1770155823658,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_22","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:12Z","timestamp":1770109092000},"page":"386-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7904-1939","authenticated-orcid":false,"given":"Zhiguo","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9725-687X","authenticated-orcid":false,"given":"Junyong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7319-6139","authenticated-orcid":false,"given":"Chongzhen","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8278-6052","authenticated-orcid":false,"given":"Jiao","family":"Dai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5841-0135","authenticated-orcid":false,"given":"Chong","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6655-8822","authenticated-orcid":false,"given":"Fuqiang","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7149-9922","authenticated-orcid":false,"given":"Dantong","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9828-5821","authenticated-orcid":false,"given":"Hongquan","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.eng.2021.10.007","volume":"12","author":"J Chen","year":"2022","unstructured":"Chen, J., Sun, J., Wang, G.: From unmanned systems to autonomous intelligent systems. Engineering 12, 16\u201319 (2022)","journal-title":"Engineering"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.biosystemseng.2021.11.008","volume":"223","author":"M Mammarella","year":"2022","unstructured":"Mammarella, M., Comba, L., Biglia, A., et al.: Cooperation of unmanned systems for agricultural applications: a theoretical framework. Biosys. Eng. 223, 61\u201380 (2022)","journal-title":"Biosys. Eng."},{"issue":"14","key":"22_CR3","doi-asserted-by":"publisher","first-page":"2162","DOI":"10.3390\/electronics11142162","volume":"11","author":"D Parekh","year":"2022","unstructured":"Parekh, D., Poddar, N., Rajpurkar, A., et al.: A review on autonomous vehicles: progress, methods and challenges. Electronics 11(14), 2162 (2022)","journal-title":"Electronics"},{"issue":"6","key":"22_CR4","first-page":"1285","volume":"26","author":"W Chen","year":"2015","unstructured":"Chen, W., Huang, X., Qiao, X., et al.: Research on software configuration error diagnosis and repair techniques. J. Softw. 26(6), 1285\u20131305 (2015)","journal-title":"J. Softw."},{"key":"22_CR5","unstructured":"Oppenheimer, D., Ganapathi, A., Patterson, D.A.: Why do Internet services fail, and what can be done about it?. In: 4th USENIX Symposium on Internet Technologies and Systems (USITS 2003) (2003)"},{"key":"22_CR6","unstructured":"Johnson, R.: More details on today\u2019s outage (2017). http:\/\/www.facebook.com\/notes\/facebook-engineering\/more-details-on-todays-outage\/431441338919"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Y., He, H., Legunsen, O., et al.: An evolutionary study of configuration design and implementation in cloud systems. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 188\u2013200 (2021)","DOI":"10.1109\/ICSE43902.2021.00029"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"102638","DOI":"10.1016\/j.cose.2022.102638","volume":"116","author":"A Paya","year":"2022","unstructured":"Paya, A., Cotarelo, A., Redondo, J.M.: Egida: automated security configuration deployment systems with early error detection. Comput. Secur. 116, 102638 (2022)","journal-title":"Comput. Secur."},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Karamsetty, S.: Blockchain-based incentive announcement network for communications of smart vehicles. In: Handbook of Research on Technologies and Systems for E-Collaboration During Global Crises, pp. 357\u2013370 (2022)","DOI":"10.4018\/978-1-7998-9640-1.ch023"},{"key":"22_CR10","unstructured":"Liu, Y., Zhou, Y., Zhang, H., et al.: Rethinking software misconfigurations in the real world: an empirical study and literature analysis. arXiv preprint arXiv:2412.11121 (2024)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Wen, C., Cao, J., Su, J., et al.: Enchanting program specification synthesis by large language models using static analysis and program verification. In: International Conference on Computer Aided Verification, pp. 302\u2013328. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-65630-9_16"},{"issue":"4","key":"22_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/3487019.3487021","volume":"19","author":"P Thomson","year":"2021","unstructured":"Thomson, P.: Static analysis: an introduction: the fundamental challenge of software engineering is one of complexity. Queue 19(4), 29\u201341 (2021)","journal-title":"Queue"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Lipp, S., Banescu, S., Pretschner, A.: An empirical study on the effectiveness of static C code analyzers for vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 544\u2013555 (2022)","DOI":"10.1145\/3533767.3534380"},{"key":"22_CR14","unstructured":"Attariyan, M., Chow, M., Flinn, J.: X-ray: automating {Root-Cause} diagnosis of performance anomalies in production software. In: 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2012), pp. 307\u2013320 (2012)"},{"issue":"7","key":"22_CR15","first-page":"1","volume":"30","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Ye, H., Chen, W.: A survey on software system configuration research. Comput. Syst. Appl. 30(7), 1\u201312 (2021)","journal-title":"Comput. Syst. Appl."},{"issue":"12","key":"22_CR16","doi-asserted-by":"publisher","first-page":"363","DOI":"10.3390\/aerospace8120363","volume":"8","author":"N Elmeseiry","year":"2021","unstructured":"Elmeseiry, N., Alshaer, N., Ismail, T.: A detailed survey and future directions of unmanned aerial vehicles (UAVs) with potential applications. Aerospace 8(12), 363 (2021)","journal-title":"Aerospace"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Klees, G., Ruef, A., Cooper, B., et al.: Evaluating fuzz testing. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2123\u20132138 (2018)","DOI":"10.1145\/3243734.3243804"},{"key":"22_CR18","unstructured":"Pak, B.S.: Hybrid fuzz testing: discovering software bugs via fuzzing and symbolic execution. School of Computer Science Carnegie Mellon University, pp. 123\u2013130 (2012)"},{"issue":"4","key":"22_CR19","doi-asserted-by":"publisher","first-page":"1422","DOI":"10.1109\/TR.2021.3112538","volume":"70","author":"LJ Moukahal","year":"2021","unstructured":"Moukahal, L.J., Zulkernine, M., Soukup, M.: Vulnerability-oriented fuzz testing for connected autonomous vehicle systems. IEEE Trans. Reliab. 70(4), 1422\u20131437 (2021)","journal-title":"IEEE Trans. Reliab."},{"key":"22_CR20","unstructured":"Rabkin, A.S.: Using program analysis to reduce misconfiguration in open source systems software. University of California, Berkeley (2012)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Yuan, D., Mai, H., Xiong, W., et al.: Sherlog: error diagnosis by connecting clues from run-time logs. In: Proceedings of the Fifteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 143\u2013154 (2010)","DOI":"10.1145\/1736020.1736038"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ernst, M.D.: Automated diagnosis of software configuration errors. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 312\u2013321 (2013)","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Li, W., Li, S., Liao, X., et al.: Conftest: generating comprehensive misconfiguration for system reaction ability evaluation. In: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, pp. 88\u201397 (2017)","DOI":"10.1145\/3084226.3084244"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Talwadker, R.: Dexter: faster troubleshooting of misconfiguration cases using system logs. In: Proceedings of the 10th ACM International Systems and Storage Conference, pp. 1\u201312 (2017)","DOI":"10.1145\/3078468.3078484"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Santolucito, M., Zhai, E., Piskac, R.: Probabilistic automated language learning for configuration files. In: Computer Aided Verification: 28th International Conference, CAV 2016, Toronto, ON, Canada, 17\u201323 July 2016, Proceedings, Part II 28, pp. 80\u201387 (2016)","DOI":"10.1007\/978-3-319-41540-6_5"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Santolucito, M., Zhai, E., Dhodapkar, R., et al.: Synthesizing configuration file specifications with association rule learning. In: Proceedings of the ACM on Programming Languages, (OOPSLA), vol. 1, pp. 1\u201320 (2017)","DOI":"10.1145\/3133888"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Zheng, W., Liu, C., Deng, P., et al.: Enhancing concurrency vulnerability detection through AST-based static fuzz mutation. J. Syst. Softw. 112352 (2025)","DOI":"10.1016\/j.jss.2025.112352"},{"issue":"10","key":"22_CR28","doi-asserted-by":"publisher","first-page":"10044","DOI":"10.1016\/j.jksuci.2022.10.004","volume":"34","author":"J Wang","year":"2022","unstructured":"Wang, J., Baker, T., Zhou, Y., et al.: Automatic mapping of configuration options in software using static analysis. J. King Saud Univ.-Comput. Inf. Sci. 34(10), 10044\u201310055 (2022)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Kim, S., Liu, M., Rhee, J.J., et al.: Drivefuzz: discovering autonomous driving bugs through driving quality-guided fuzzing. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1753\u20131767 (2022)","DOI":"10.1145\/3548606.3560558"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Xu, X., Wang, W., Chen, Z., et al.: Finding the PISTE: towards understanding privacy leaks in vertical federated learning systems. IEEE Trans. Dependable Secure Comput. (2024)","DOI":"10.1109\/TDSC.2024.3445600"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhao, Y., Han, Y., et al.: VFLMonitor: defending one-party hijacking attacks in vertical federated learning. IEEE Trans. Inf. Forensics Secur. (2025)","DOI":"10.1109\/TIFS.2025.3564879"},{"key":"22_CR32","unstructured":"Open-source simulator for autonomous driving research (2019). https:\/\/carla.org\/"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:21Z","timestamp":1770109101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}