{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:31:03Z","timestamp":1742949063843,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_20","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"257-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mutation Methods for\u00a0Structured Input to\u00a0Enhance Path Coverage of\u00a0Fuzzers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6085-9200","authenticated-orcid":false,"given":"Yonggon","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-7697","authenticated-orcid":false,"given":"Youngjoo","family":"Ko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0484-0790","authenticated-orcid":false,"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"issue":"5","key":"20_CR1","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TSE.2017.2785841","volume":"45","author":"M B\u00f6hme","year":"2017","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. IEEE Trans. Softw. Eng. 45(5), 489\u2013506 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Chen, P., Chen, H.: Angora: efficient fuzzing by principled search. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 711\u2013725. IEEE (2018)","DOI":"10.1109\/SP.2018.00046"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Coppik, N., Schwahn, O., Suri, N.: MemFuzz: using memory accesses to guide fuzzing. In: 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp. 48\u201358. IEEE (2019)","DOI":"10.1109\/ICST.2019.00015"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-319-89500-0_53","volume-title":"Information and Communications Security","author":"R Fan","year":"2018","unstructured":"Fan, R., Chang, Y.: Machine learning for black-box fuzzing of network protocols. In: Qing, S., Mitchell, C., Chen, L., Liu, D. (eds.) ICICS 2017. LNCS, vol. 10631, pp. 621\u2013632. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89500-0_53"},{"key":"20_CR5","unstructured":"Fioraldi, A., Maier, D., Ei\u00dffeldt, H., Heuse, M.: $$\\{$$AFL++$$\\}$$: combining incremental steps of fuzzing research. In: 14th USENIX Workshop on Offensive Technologies (WOOT 2020) (2020)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Gan, S., et al.: CollAFL: path sensitive fuzzing. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 679\u2013696. IEEE (2018)","DOI":"10.1109\/SP.2018.00040"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ganesh, V., Leek, T., Rinard, M.: Taint-based directed whitebox fuzzing. In: 2009 IEEE 31st International Conference on Software Engineering, pp. 474\u2013484. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"20_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-28865-9_18","volume-title":"Security and Privacy in Communication Networks","author":"H Gascon","year":"2015","unstructured":"Gascon, H., Wressnegger, C., Yamaguchi, F., Arp, D., Rieck, K.: Pulsar: stateful black-box fuzzing of proprietary network protocols. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICST, vol. 164, pp. 330\u2013347. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28865-9_18"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. In: Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 206\u2013215 (2008)","DOI":"10.1145\/1375581.1375607"},{"issue":"3","key":"20_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: Sage: whitebox fuzzing for security testing. Commun. ACM 55(3), 40\u201344 (2012)","journal-title":"Commun. ACM"},{"key":"20_CR11","unstructured":"Lyu, C., et al.: MOPT: optimized mutation scheduling for fuzzers. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1949\u20131966 (2019)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Peng, H., Shoshitaishvili, Y., Payer, M.: T-fuzz: fuzzing by program transformation. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 697\u2013710. IEEE (2018)","DOI":"10.1109\/SP.2018.00056"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: Vuzzer: application-aware evolutionary fuzzing. In: NDSS, vol. 17, pp. 1\u201314 (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Sargsyan, S., Kurmangaleev, S., Mehrabyan, M., Mishechkin, M., Ghukasyan, T., Asryan, S.: Grammar-based fuzzing. In: 2018 Ivannikov Memorial Workshop (IVMEM), pp. 32\u201335. IEEE (2018)","DOI":"10.1109\/IVMEM.2018.00013"},{"key":"20_CR15","unstructured":"Serebryany, K.: $$\\{$$OSS-Fuzz$$\\}$$-Google\u2019s continuous fuzzing service for open source software (2017)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Sun, L., Li, X., Qu, H., Zhang, X.: AFLTurbo: speed up path discovery for greybox fuzzing. In: 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), pp. 81\u201391. IEEE (2020)","DOI":"10.1109\/ISSRE5003.2020.00017"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, B., Wei, L., Liu, Y.: Superion: grammar-aware greybox fuzzing. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 724\u2013735. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00081"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Wen, C., et al.: MemLock: memory usage guided fuzzing. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 765\u2013777 (2020)","DOI":"10.1145\/3377811.3380396"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Woo, M., Cha, S.K., Gottlieb, S., Brumley, D.: Scheduling black-box mutational fuzzing. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 511\u2013522 (2013)","DOI":"10.1145\/2508859.2516736"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Xu, W., Moon, H., Kashyap, S., Tseng, P.N., Kim, T.: Fuzzing file systems via two-dimensional input space exploration. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 818\u2013834. IEEE (2019)","DOI":"10.1109\/SP.2019.00035"},{"key":"20_CR21","unstructured":"Yue, T., et al.: $$\\{$$EcoFuzz$$\\}$$: adaptive $$\\{$$Energy-Saving$$\\}$$ greybox fuzzing as a variant of the adversarial $$\\{$$Multi-Armed$$\\}$$ bandit. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 2307\u20132324 (2020)"},{"key":"20_CR22","unstructured":"Yun, I., Lee, S., Xu, M., Jang, Y., Kim, T.: $$\\{$$QSYM$$\\}$$: a practical concolic execution engine tailored for hybrid fuzzing. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 745\u2013761 (2018)"},{"key":"20_CR23","unstructured":"Zalewski, M.: American fuzzy lop (2020). https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Zhong, R., Chen, Y., Hu, H., Zhang, H., Lee, W., Wu, D.: SQUIRREL: testing database management systems with language validity and coverage feedback. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 955\u2013970 (2020)","DOI":"10.1145\/3372297.3417260"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:04:24Z","timestamp":1704863064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}