{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:42:28Z","timestamp":1765438948390,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819997848"},{"type":"electronic","value":"9789819997855"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_35","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"499-512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzing Drone Control System Configurations Based on\u00a0Quality-Diversity Enhanced Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Zhiwei","family":"Chang","sequence":"first","affiliation":[]},{"given":"Hanfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Sihan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zheli","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"35_CR1","unstructured":"Ardupilot (2022). http:\/\/ardupilot.org"},{"key":"35_CR2","unstructured":"American fuzzy lop (2023). http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"35_CR3","unstructured":"Amovlab (2023). http:\/\/www.amovlab.com\/"},{"key":"35_CR4","unstructured":"Gazobo (2023). http:\/\/gazebosim.org"},{"key":"35_CR5","unstructured":"Honggfuzz (2023). http:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"35_CR6","unstructured":"Libfuzzer (2023). http:\/\/google.github.io\/honggfuzz\/"},{"key":"35_CR7","unstructured":"Mavexplorer (2023). http:\/\/github.com\/ArduPilot\/MAVProxy"},{"key":"35_CR8","unstructured":"Mavlink (2023). http:\/\/mavlink.io"},{"key":"35_CR9","unstructured":"Qgroundcontrol (2023). http:\/\/qgroundcontrol.com"},{"key":"35_CR10","unstructured":"Uav logviewer (2023). http:\/\/ardupilot.org\/copter\/docs\/common-uavlogviewer.html"},{"key":"35_CR11","unstructured":"Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10) (2010)"},{"issue":"3","key":"35_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni, R., Coppa, E., D\u2019elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. (CSUR) 51(3), 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Advances in Neural Information Processing Systems 14 (2001)","DOI":"10.7551\/mitpress\/1120.003.0080"},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"S3","DOI":"10.1016\/j.diin.2017.06.013","volume":"22","author":"DR Clark","year":"2017","unstructured":"Clark, D.R., Meffert, C., Baggili, I., Breitinger, F.: Drop (drone open source parser) your drone: forensic analysis of the DJI phantom iii. Digit. Investig. 22, S3\u2013S14 (2017)","journal-title":"Digit. Investig."},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, pp. 196\u2013206 (2007)","DOI":"10.1145\/1273463.1273490"},{"key":"35_CR16","unstructured":"Haller, I., Slowinska, A., Neugschwandtner, M., Bos, H.: Dowsing for $$\\{$$Overflows$$\\}$$: a guided fuzzer to find buffer boundary violations. In: 22nd USENIX Security Symposium (USENIX Security 13), pp. 49\u201364 (2013)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Han, R., et al.: Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search. arXiv preprint arXiv:2112.03511 (2021)","DOI":"10.1145\/3510003.3510084"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Kim, S., Liu, M., Rhee, J.J., Jeon, Y., Kwon, Y., Kim, C.H.: Drivefuzz: discovering autonomous driving bugs through driving quality-guided fuzzing. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1753\u20131767 (2022)","DOI":"10.1145\/3548606.3560558"},{"key":"35_CR19","unstructured":"Kim, T., et al.: $$\\{$$RVFuzzer$$\\}$$: Finding input validation bugs in robotic vehicles through $$\\{$$Control-Guided$$\\}$$ testing. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 425\u2013442 (2019)"},{"key":"35_CR20","doi-asserted-by":"publisher","first-page":"43203","DOI":"10.1109\/ACCESS.2018.2863237","volume":"6","author":"YM Kwon","year":"2018","unstructured":"Kwon, Y.M., Yu, J., Cho, B.M., Eun, Y., Park, K.J.: Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles. IEEE Access 6, 43203\u201343212 (2018)","journal-title":"IEEE Access"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Li, G., et al.: AV-FUZZER: finding safety violations in autonomous driving systems. In: 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), pp. 25\u201336. IEEE (2020)","DOI":"10.1109\/ISSRE5003.2020.00012"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Maskur, A.F., Asnar, Y.D.W.: Static code analysis tools with the taint analysis method for detecting web application vulnerability. In: 2019 International Conference on Data and Software Engineering (ICoDSE), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICoDSE48700.2019.9092614"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Meier, L., Tanskanen, P., Fraundorfer, F., Pollefeys, M.: Pixhawk: a system for autonomous flight using onboard computer vision. In: 2011 IEEE International Conference on Robotics and Automation, pp. 2992\u20132997. IEEE (2011)","DOI":"10.1109\/ICRA.2011.5980229"},{"key":"35_CR24","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-93025-1_4","volume-title":"Evolutionary Algorithms and Neural Networks","author":"S Mirjalili","year":"2019","unstructured":"Mirjalili, S.: Genetic algorithm. In: Evolutionary Algorithms and Neural Networks. SCI, vol. 780, pp. 43\u201355. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-93025-1_4"},{"key":"35_CR25","unstructured":"M\u00f8ller, A., Schwartzbach, M.I.: Static program analysis. Notes. Feb (2012)"},{"key":"35_CR26","unstructured":"Mouret, J.B., Clune, J.: Illuminating search spaces by mapping elites. arXiv preprint arXiv:1504.04909 (2015)"},{"key":"35_CR27","doi-asserted-by":"crossref","unstructured":"Prayudani, S., Hizriadi, A., Nababan, E., Suwilo, S.: Analysis effect of tournament selection on genetic algorithm performance in traveling salesman problem (TSP). In: Journal of Physics: Conference Series. vol. 1566, p. 012131. IOP Publishing (2020)","DOI":"10.1088\/1742-6596\/1566\/1\/012131"},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Pugh, J.K., Soros, L.B., Stanley, K.O.: Quality diversity: A new frontier for evolutionary computation. Frontiers in Robotics and AI p. 40 (2016)","DOI":"10.3389\/frobt.2016.00040"},{"key":"35_CR29","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: NDSS, vol. 16, pp. 1\u201316 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"35_CR30","doi-asserted-by":"crossref","unstructured":"Xu, T., et al.: Do not blame users for misconfigurations. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 244\u2013259 (2013)","DOI":"10.1145\/2517349.2522727"},{"key":"35_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/978-3-030-29959-0_31","volume-title":"Computer Security \u2013 ESORICS 2019","author":"Y Yao","year":"2019","unstructured":"Yao, Y., Zhou, W., Jia, Y., Zhu, L., Liu, P., Zhang, Y.: Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 638\u2013657. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_31"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:13:41Z","timestamp":1706984021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}