{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:47:10Z","timestamp":1743101230535,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_22","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"282-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7116-6062","authenticated-orcid":false,"given":"Seungho","family":"Jeon","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0971-8548","authenticated-orcid":false,"given":"Jung Taek","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"22_CR1","unstructured":"SIEMENS. https:\/\/www.siemens.com\/global\/en.html. Accessed 22 May 2023"},{"key":"22_CR2","unstructured":"CODESYS GmbH. https:\/\/www.codesys.com\/. Accessed 22 May 2023"},{"key":"22_CR3","unstructured":"Bytes, A., et al.: FieldFuzz: stateful fuzzing of proprietary industrial controllers using injected ghosts. arXiv:2204.13499 (2022)"},{"key":"22_CR4","unstructured":"Zalewski, M.: American fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/. Accessed 22 May 2023"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Jung, J., Tong, S., Hu, H., Lim, J., Jin, Y., Kim, T.: WINNIE: fuzzing windows applications with harness synthesis and fast cloning. In: Proceedings of the 2021 Network and Distributed System Security Symposium (2021)","DOI":"10.14722\/ndss.2021.24334"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Babi\u0107, D., et al.: FUDGE: fuzz driver generation at scale. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019)","DOI":"10.1145\/3338906.3340456"},{"key":"22_CR7","unstructured":"Ispoglou, K.K., Austin, D., Mohan, V., Payer, M.: FuzzGen: automatic fuzzer generation. In: Proceedings on the 29th USENIX Security Symposium (2020)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Tychalas, D., Maniatakos, M.: IFFSET: in-field fuzzing of industrial control systems using system emulation. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (2020)","DOI":"10.23919\/DATE48585.2020.9116365"},{"key":"22_CR9","unstructured":"Tychalas, D., Benkraouda, H., Maniatakos, M.: ICSFuzz: manipulating I\/Os and repurposing binary code to enable instrumented fuzzing in ICS control applications. In: USENIX Security Symposium (2021)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.-T., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978428"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Jeon, S., Moon, J.: Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search. Neural Comput. Appl. 34, 10731\u201310750 (2022). https:\/\/doi.org\/10.1007\/s00521-022-07008-8","DOI":"10.1007\/s00521-022-07008-8"},{"key":"22_CR12","unstructured":"honggfuzz. https:\/\/honggfuzz.dev\/. Accessed 22 May 2023"},{"key":"22_CR13","unstructured":"OSS-Fuzz. https:\/\/google.github.io\/oss-fuzz\/. Accessed 22 May 2023"},{"issue":"6","key":"22_CR14","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"C-K Luk","year":"2005","unstructured":"Luk, C.-K., et al.: Pin: building customized program analysis tools with dynamic instrumentation. ACM SIGPLAN Not. 40(6), 190\u2013200 (2005)","journal-title":"ACM SIGPLAN Not."},{"issue":"6","key":"22_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Not. 42(6), 89\u2013100 (2007)","journal-title":"ACM SIGPLAN Not."},{"key":"22_CR16","unstructured":"Ptrace(2)-Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man2\/ptrace.2.html. Accessed 22 May 2023"},{"key":"22_CR17","unstructured":"ARM developer: ARM Cortex-A Series Programmer\u2019s Guide for ARMv7-A. https:\/\/developer.arm.com\/documentation\/den0013\/d\/Application-Binary-Interfaces\/Procedure-Call-Standard. Accessed 22 May 2023"},{"key":"22_CR18","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis & transformation. In: International Symposium on Code Generation and Optimization (GGO) (2004)"},{"key":"22_CR19","unstructured":"libFuzzer. https:\/\/llvm.org\/docs\/LibFuzzer.html. Accessed 22 May 2023"},{"key":"22_CR20","unstructured":"CVE-2020-7052. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-7052. Accessed 22 May 2023"},{"key":"22_CR21","unstructured":"CVE-2020-10245. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-10245. Accessed 22 May 2023"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:04:32Z","timestamp":1704863072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}