{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:16:52Z","timestamp":1772641012158,"version":"3.50.1"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFC0833105Z1"],"award-info":[{"award-number":["2020YFC0833105Z1"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-YBGY-262"],"award-info":[{"award-number":["2023-YBGY-262"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62141208"],"award-info":[{"award-number":["62141208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202414"],"award-info":[{"award-number":["62202414"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.infsof.2023.107194","type":"journal-article","created":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T02:54:44Z","timestamp":1678330484000},"page":"107194","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":55,"special_numbering":"C","title":["An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis"],"prefix":"10.1016","volume":"158","author":[{"given":"Wei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Peiran","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Gui","sequence":"additional","affiliation":[]},{"given":"Xiaoxue","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.infsof.2023.107194_b1","first-page":"42","article-title":"A review of software and cybersecurity research","volume":"29","author":"Liu","year":"2018","journal-title":"Softw. J."},{"issue":"11","key":"10.1016\/j.infsof.2023.107194_b2","article-title":"Testing program segments to detect software faults during programming","volume":"17","author":"Rao","year":"2021","journal-title":"Int. J. Perform. Eng."},{"issue":"5","key":"10.1016\/j.infsof.2023.107194_b3","first-page":"944","article-title":"Review of fuzzy testing techniques","volume":"58","author":"Ren","year":"2021","journal-title":"Comput. Res. Dev."},{"key":"10.1016\/j.infsof.2023.107194_b4","series-title":"Vuldeepecker: A deep learning-based system for vulnerability detection","author":"Li","year":"2018"},{"key":"10.1016\/j.infsof.2023.107194_b5","article-title":"Sysevr: A framework for using deep learning to detect software vulnerabilities","author":"Li","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.infsof.2023.107194_b6","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.infsof.2023.107194_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2020.110659","article-title":"The impact factors on the performance of machine learning-based vulnerability detection: A comparative study","volume":"168","author":"Zheng","year":"2020","journal-title":"J. Syst. Softw."},{"issue":"5","key":"10.1016\/j.infsof.2023.107194_b8","first-page":"1294","article-title":"Empirical study of security defect report prediction methods based on deep learning","volume":"31","author":"Zheng","year":"2020","journal-title":"Softw. J."},{"key":"10.1016\/j.infsof.2023.107194_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111245","article-title":"Interpretability application of the just-in-time software defect prediction model","volume":"188","author":"Zheng","year":"2022","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107194_b10","article-title":"Deep learning based vulnerability detection: Are we there yet","author":"Chakraborty","year":"2021","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"10.1016\/j.infsof.2023.107194_b11","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1002\/cpe.3711","article-title":"A systematic review of approaches for testing concurrent programs","volume":"28","author":"Arora","year":"2016","journal-title":"Concurr. Comput.: Pract. Exper."},{"issue":"11","key":"10.1016\/j.infsof.2023.107194_b12","first-page":"2267","article-title":"Review of concurrent program mutation testing research","volume":"48","author":"Tian","year":"2020","journal-title":"Electron. J."},{"key":"10.1016\/j.infsof.2023.107194_b13","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering","first-page":"724","article-title":"Superion: Grammar-aware greybox fuzzing","author":"Wang","year":"2019"},{"key":"10.1016\/j.infsof.2023.107194_b14","series-title":"Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering","first-page":"627","article-title":"Steelix: program-state based binary fuzzing","author":"Li","year":"2017"},{"key":"10.1016\/j.infsof.2023.107194_b15","series-title":"NDSS","first-page":"1","article-title":"Vuzzer: Application-aware evolutionary fuzzing","volume":"Vol. 17","author":"Rawat","year":"2017"},{"key":"10.1016\/j.infsof.2023.107194_b16","series-title":"European Symposium on Research in Computer Security","first-page":"581","article-title":"Ifuzzer: An evolutionary interpreter fuzzer using genetic programming","author":"Veggalam","year":"2016"},{"issue":"8","key":"10.1016\/j.infsof.2023.107194_b17","first-page":"649","article-title":"Role of software testing life cycle(STLC) in software development life cycle (SDLC)","volume":"6","author":"Parihar","year":"2019","journal-title":"Int. J. Res."},{"issue":"11","key":"10.1016\/j.infsof.2023.107194_b18","first-page":"2215","article-title":"A survey on exposing, detecting and voiding concurrency bugs","volume":"38","author":"Su","year":"2015","journal-title":"Chinese J. Comput."},{"key":"10.1016\/j.infsof.2023.107194_b19","series-title":"2017 IEEE Symposium on Security and Privacy","first-page":"579","article-title":"Skyfire: Data-driven seed generation for fuzzing","author":"Wang","year":"2017"},{"key":"10.1016\/j.infsof.2023.107194_b20","series-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering","first-page":"999","article-title":"Typestate-guided fuzzer for discovering use-after-free vulnerabilities","author":"Wang","year":"2020"},{"key":"10.1016\/j.infsof.2023.107194_b21","series-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","first-page":"533","article-title":"Cerebro: context-aware adaptive fuzzing for effective vulnerability detection","author":"Li","year":"2019"},{"key":"10.1016\/j.infsof.2023.107194_b22","series-title":"2018 IEEE Symposium on Security and Privacy","first-page":"679","article-title":"Collafl: Path sensitive fuzzing","author":"Gan","year":"2018"},{"key":"10.1016\/j.infsof.2023.107194_b23","series-title":"Second Workshop on Mutation Analysis (Mutation 2006 - ISSRE Workshops 2006)","first-page":"9","article-title":"Basic operations for generating behavioral mutants","author":"Belli","year":"2006"},{"key":"10.1016\/j.infsof.2023.107194_b24","series-title":"Advanced Computational Methods for Knowledge Engineering","first-page":"157","article-title":"Problems of mutation testing and higher order mutation testing","author":"Nguyen","year":"2014"},{"key":"10.1016\/j.infsof.2023.107194_b25","doi-asserted-by":"crossref","unstructured":"Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen, James Walden, Software vulnerability prediction using text analysis techniques, in: Proceedings of the 4th International Workshop on Security Measurements and Metrics, 2012, pp. 7\u201310.","DOI":"10.1145\/2372225.2372230"},{"key":"10.1016\/j.infsof.2023.107194_b26","series-title":"International Symposium on Practical Aspects of Declarative Languages","first-page":"5","article-title":"Detection of asynchronous message passing errors using static analysis","author":"Christakis","year":"2011"},{"issue":"5","key":"10.1016\/j.infsof.2023.107194_b27","first-page":"1230","article-title":"Automated detection method for numerical stability-related vulnerabilities","volume":"29","author":"Shen","year":"2018","journal-title":"Softw. J."},{"key":"10.1016\/j.infsof.2023.107194_b28","series-title":"2014 IEEE Symposium on Security and Privacy","first-page":"590","article-title":"Modeling and discovering vulnerabilities with code property graphs","author":"Yamaguchi","year":"2014"},{"key":"10.1016\/j.infsof.2023.107194_b29","series-title":"2012 34th International Conference on Software Engineering","first-page":"310","article-title":"CBCD: Cloned buggy code detector","author":"Li","year":"2012"},{"key":"10.1016\/j.infsof.2023.107194_b30","series-title":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","first-page":"85","article-title":"Toward large-scale vulnerability discovery using machine learning","author":"Grieco","year":"2016"},{"key":"10.1016\/j.infsof.2023.107194_b31","series-title":"2015 IEEE 14th International Conference on Machine Learning and Applications","first-page":"543","article-title":"Predicting vulnerable software components through n-gram analysis and statistical feature selection","author":"Pang","year":"2015"},{"issue":"10","key":"10.1016\/j.infsof.2023.107194_b32","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","article-title":"Predicting vulnerable software components via text mining","volume":"40","author":"Scandariato","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107194_b33","series-title":"Automated software vulnerability detection with machine learning","author":"Harer","year":"2018"},{"key":"10.1016\/j.infsof.2023.107194_b34","doi-asserted-by":"crossref","unstructured":"N.H. Pham, T.T. Nguyen, H.A. Nguyen, T.N. Nguyen, Detection of recurring software vulnerabilities, in: IEEE\/ACM International Conference on Automated Software Engineering, 2010.","DOI":"10.1145\/1858996.1859089"},{"key":"10.1016\/j.infsof.2023.107194_b35","series-title":"2017 IEEE International Conference on Software Quality, Reliability and Security","first-page":"318","article-title":"Software defect prediction via convolutional neural network","author":"Li","year":"2017"},{"issue":"047\u2013012","key":"10.1016\/j.infsof.2023.107194_b36","article-title":"Software defect prediction based on heavy subnode abstract syntax trees","author":"Huang","year":"2021","journal-title":"Comput. Eng."},{"key":"10.1016\/j.infsof.2023.107194_b37","series-title":"Mutation operators for Ada","author":"Offutt","year":"1996"},{"key":"10.1016\/j.infsof.2023.107194_b38","series-title":"Brazilian Symposium on Software Engineering","first-page":"272","article-title":"Mutant operators for testing concurrent java programs","author":"Delamaro","year":"2001"},{"issue":"11","key":"10.1016\/j.infsof.2023.107194_b39","first-page":"19","article-title":"A review of concurrent defect exposure, detection and avoidance research","volume":"38","author":"Su","year":"2015","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.infsof.2023.107194_b40","series-title":"Proceedings of 1993 15th International Conference on Software Engineering","first-page":"100","article-title":"An experimental evaluation of selective mutation","author":"Offutt","year":"1993"},{"key":"10.1016\/j.infsof.2023.107194_b41","series-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering-Volume 1","first-page":"435","article-title":"Is operator-based mutant selection superior to random mutant selection?","author":"Zhang","year":"2010"},{"key":"10.1016\/j.infsof.2023.107194_b42","series-title":"Proceedings of the 2012 International Symposium on Software Testing and Analysis","first-page":"331","article-title":"Regression mutation testing","author":"Zhang","year":"2012"},{"key":"10.1016\/j.infsof.2023.107194_b43","series-title":"2014 IEEE 25th International Symposium on Software Reliability Engineering","first-page":"277","article-title":"An empirical study on the scalability of selective mutation testing","author":"Zhang","year":"2014"},{"key":"10.1016\/j.infsof.2023.107194_b44","series-title":"Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems","first-page":"865","article-title":"Understanding real-world concurrency bugs in go","author":"Tu","year":"2019"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000484?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000484?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:40:34Z","timestamp":1760586034000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584923000484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":44,"alternative-id":["S0950584923000484"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107194","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107194","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107194"}}