{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T12:40:14Z","timestamp":1695213614797},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11704-021-0075-8","type":"journal-article","created":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T02:02:27Z","timestamp":1638496947000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pusher: an augmented fuzzer based on the connection between input and comparison operand"],"prefix":"10.1007","volume":"16","author":[{"given":"Bin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jiaxi","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ruilin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Su","sequence":"additional","affiliation":[]},{"given":"Chaojing","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,3]]},"reference":[{"issue":"12","key":"75_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"B P Miller","year":"1990","unstructured":"Miller B P, Fredriksen L, So B. An empirical study of the reliability of UNIX utilities. Communications of the ACM, 1990, 33(12): 32\u201344","journal-title":"Communications of the ACM"},{"issue":"3","key":"75_CR2","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1109\/TR.2018.2834476","volume":"67","author":"H Liang","year":"2018","unstructured":"Liang H, Pei X, Jia X, Shen W, Zhang J. Fuzzing: state of the art. IEEE Transactions on Reliability, 2018, 67(3): 1199\u20131218","journal-title":"IEEE Transactions on Reliability"},{"key":"75_CR3","doi-asserted-by":"crossref","unstructured":"Serebryany K. Continuous fuzzing with libfuzzer and addresssanitizer. In: Proceedings of IEEE Cybersecurity Development. 2016, 157\u2013157","DOI":"10.1109\/SecDev.2016.043"},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"Gan S, Zhang C, Qin X, Tu X, Li K, Pei Z, Chen Z. CollAFL: path sensitive fuzzing. In: Proceedings of IEEE Symposium on Security and Privacy. 2018, 679\u2013696","DOI":"10.1109\/SP.2018.00040"},{"key":"75_CR5","doi-asserted-by":"crossref","unstructured":"Demoura L, Bj\u00f8rner N. Z3: An efficient SMT solver. In: Proceedings of Tools and Algorithms for the Construction and Analysis of Systems. 2008, 337\u2013340","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"75_CR6","doi-asserted-by":"crossref","unstructured":"Stephens N, Grosen J, Salls C, Dutcher A, Wang R, Corbetta J, Shoshitaishvili Y, Kruegel C, Vigna G. Driller: augmenting fuzzing through selective symbolic execution. In: Proceedings of Network and Distributed System Security Symposium. 2016","DOI":"10.14722\/ndss.2016.23368"},{"key":"75_CR7","doi-asserted-by":"crossref","unstructured":"Zhao L, Duan Y, Yin H, Xuan J. Send hardest problems my way: probabilistic path prioritization for hybrid fuzzing. In: Proceedings 2019 Network and Distributed System Security Symposium. 2019","DOI":"10.14722\/ndss.2019.23504"},{"key":"75_CR8","series-title":"PhD thesis","volume-title":"Hybrid fuzz testing: discovering software bugs via fuzzing and symbolic execution","author":"B S Pak","year":"2012","unstructured":"Pak B S. Hybrid fuzz testing: discovering software bugs via fuzzing and symbolic execution. PhD thesis, Carnegie Mellon University Pittsburgh, PA, 2012"},{"issue":"3","key":"75_CR9","first-page":"1","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni R, Coppa E, Doelia D C, Demetrescu C, Finocchi I. A survey of symbolic execution techniques. Journal of ACM Computer Survey, 2018, 51(3): 1\u201339","journal-title":"Journal of ACM Computer Survey"},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Peng H, Shoshitaishvili Y, Payer M. T-Fuzz: fuzzing by program transformation. In: Proceedings of IEEE Symposium on Security and Privacy. 2018, 697\u2013710","DOI":"10.1109\/SP.2018.00056"},{"key":"75_CR11","unstructured":"Newsome J, Song D X. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the Network and Distributed System Security Symposium. 2005"},{"key":"75_CR12","doi-asserted-by":"crossref","unstructured":"Rawat S, Jain V, Kumar A, Cojocar L, Giuffrida C, Bos H. VUzzer: application-aware evolutionary fuzzing. In: Proceedings of Network and Distributed System Security Symposium. 2017","DOI":"10.14722\/ndss.2017.23404"},{"key":"75_CR13","unstructured":"Dowser: A guided fuzzer to find buffer overflow vulnerabilities. In: Proceedings of the USENIX Security Symposium"},{"key":"75_CR14","doi-asserted-by":"crossref","unstructured":"Chen P, Chen H. Angora: efficient fuzzing by principled search. In: Proceedings of IEEE Symposium on Security and Privacy. 2018, 711\u2013725","DOI":"10.1109\/SP.2018.00046"},{"key":"75_CR15","doi-asserted-by":"crossref","unstructured":"Li Y, Chen B, Chandramohan M, Lin S W, Liu Y, Tiu A. Steelix: program-state based binary fuzzing. In: Proceedings of the Joint Meeting on Foundations of Software Engineering. 2017, 627\u2013637","DOI":"10.1145\/3106237.3106295"},{"key":"75_CR16","doi-asserted-by":"publisher","first-page":"42557","DOI":"10.1109\/ACCESS.2019.2905744","volume":"7","author":"J Ye","year":"2019","unstructured":"Ye J, Zhang B, Li R, Feng C, Tang C. Program state sensitive parallel fuzzing for real world software. IEEE Access, 2019, 7: 42557\u201342564","journal-title":"IEEE Access"},{"key":"75_CR17","doi-asserted-by":"crossref","unstructured":"B\u00f6hme M, Pham V T, Roychoudhury A. Coveragebased greybox fuzzing As Markov chain. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. 2016, 1032\u20131043","DOI":"10.1145\/2976749.2978428"},{"key":"75_CR18","doi-asserted-by":"crossref","unstructured":"Lemieux C, Sen K. FairFuzz: a targeted mutation strategy for increasing greybox fuzz testing coverage. In: Proceedings of ACM\/IEEE International Conference on Automated Software Engineering. 2018, 475\u2013485","DOI":"10.1145\/3238147.3238176"},{"key":"75_CR19","doi-asserted-by":"crossref","unstructured":"Dave M, Agrawal R. Search based techniques and mutation analysis in automatic test case generation: a survey. In: Proceedings of IEEE International Advance Computing Conference. 2015, 795\u2013799","DOI":"10.1109\/IADCC.2015.7154816"},{"key":"75_CR20","doi-asserted-by":"crossref","unstructured":"Harman M, Jia Y, Zhang Y. Achievements, open problems and challenges for search based software testing. In: Proceedings of IEEE International Conference on Software Testing, Verification and Validation. 2015, 1\u201312","DOI":"10.1109\/ICST.2015.7102580"},{"key":"75_CR21","doi-asserted-by":"crossref","unstructured":"Fraser G, Arcuri A. EvoSuite: automatic test suite generation for object-oriented software. In: Proceedings of ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, 416\u2013419","DOI":"10.1145\/2025113.2025179"},{"key":"75_CR22","doi-asserted-by":"crossref","unstructured":"Rowe J E. Genetic algorithm theory. In: Proceedings of Conference Companion on Genetic and Evolutionary Computation. 2007, 3585","DOI":"10.1145\/1274000.1274125"},{"key":"75_CR23","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt B, Hulin P, Kirda E, Leek T, Mambretti A, Robertson W, Ulrich F, Whelan R. LAVA: large-scale automated vulnerability addition. In: Proceedings of IEEE Symposium on Security and Privacy. 2016, 110\u2013121","DOI":"10.1109\/SP.2016.15"},{"key":"75_CR24","unstructured":"Lattner C, Adve V. LLVM: a compilation framework for lifelong program analysis & transformation. In: Proceedings of IEEE International Symposium on Code Generation and Optimization. 2004, 75\u201386"},{"key":"75_CR25","doi-asserted-by":"crossref","unstructured":"Liang J, Jiang Y, Chen Y, Wang M, Zhou C, Sun J. PAFL: extend fuzzing optimizations of single mode to industrial parallel mode. In: Proceedings of ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2018, 809\u2013814","DOI":"10.1145\/3236024.3275525"},{"key":"75_CR26","unstructured":"Serebryany K, Bruening D, Potapenko A, Vyukov D. AddressSanitizer: a fast address sanity checker. In: Proceedings of USENIX Annual Technical Conference. 2012, 309\u2013318"},{"key":"75_CR27","unstructured":"Security M. fuzzdata: fuzzing resources for feeding various fuzzers with input. Mozilla Security, December 2017"},{"key":"75_CR28","doi-asserted-by":"crossref","unstructured":"Aschermann C, Schumilo S, Blazytko T, Gawlik R, Holz T. REDQUEEN: fuzzing with input-to-state correspondence. In: Proceedings of Annual Network and Distributed System Security Symposium. 2019","DOI":"10.14722\/ndss.2019.23371"},{"key":"75_CR29","doi-asserted-by":"crossref","unstructured":"B\u00f6ttinger K, Eckert C. Deepfuzz: triggering vulnerabilities deeply hidden in binaries. In: Proceedings of International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2016, 25\u201334","DOI":"10.1007\/978-3-319-40667-1_2"},{"key":"75_CR30","doi-asserted-by":"crossref","unstructured":"Wang M, Liang J, Chen Y, Jiang Y, Jiao X, Liu H, Zhao X, Sun J. Safl: increasing and accelerating testing coverage with symbolic execution and guided fuzzing. In: Proceedings of International Conference on Software Engineering: Companion Proceeedings. 2018","DOI":"10.1145\/3183440.3183494"},{"key":"75_CR31","doi-asserted-by":"crossref","unstructured":"Cho M, Kim S, Kwon T. Intriguer: field-level constraint solving for hybrid fuzzing. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. 2019, 515\u2013530","DOI":"10.1145\/3319535.3354249"},{"key":"75_CR32","doi-asserted-by":"crossref","unstructured":"Gong W, Zhang G, Zhou X. Learn to accelerate identifying new test cases in fuzzing. In: Proceeding of Security, Privacy, and Anonymity in Computation, Communication, and Storage. 2017, 298\u2013307","DOI":"10.1007\/978-3-319-72389-1_24"},{"key":"75_CR33","doi-asserted-by":"publisher","first-page":"36340","DOI":"10.1109\/ACCESS.2019.2903291","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Wu Z, Wei Q, Wang Q. Neufuzz: efficient fuzzing with deep neural network. IEEE Access, 2019, 7: 36340\u201336352","journal-title":"IEEE Access"},{"key":"75_CR34","doi-asserted-by":"crossref","unstructured":"She D, Pei K, Epstein D, Yang J, Ray B, Jana S. NEUZZ: efficient fuzzing with neural program smoothing. In: Proceedings of IEEE Symposium on Security and Privacy. 2019, 803\u2013817","DOI":"10.1109\/SP.2019.00052"},{"key":"75_CR35","doi-asserted-by":"crossref","unstructured":"Wang T, Wei T, Gu G, Zou W. Taintscope: a checksumaware directed fuzzing tool for automatic software vulnerability detection. In: Proceedings of IEEE Symposium on Security and Privacy. 2010, 497\u2013512","DOI":"10.1109\/SP.2010.37"},{"key":"75_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/1635081","volume":"2018","author":"X Liu","year":"2018","unstructured":"Liu X, Wei Q, Wang Q, Zhao Z, Yin Z. Cafa: a checksum-aware fuzzing assistant tool for coverage improvement. Journal of Security and Communication Networks, 2018, 2018: 1\u201313","journal-title":"Journal of Security and Communication Networks"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0075-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-021-0075-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-021-0075-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T21:04:40Z","timestamp":1695157480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-021-0075-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,3]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["75"],"URL":"https:\/\/doi.org\/10.1007\/s11704-021-0075-8","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,3]]},"assertion":[{"value":"21 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"164206"}}