{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:25Z","timestamp":1763968585516,"version":"3.41.2"},"reference-count":20,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFB1005704"],"award-info":[{"award-number":["2020YFB1005704"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2024,12,31]]},"DOI":"10.1080\/09540091.2024.2312104","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T18:12:32Z","timestamp":1707934352000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage"],"prefix":"10.1080","volume":"36","author":[{"given":"Yuexuan","family":"Ma","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, People\u2019s Republic of China"}]},{"given":"Xiao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, People\u2019s Republic of China"}]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Media Engineering, Communication University of Zhejiang, Hangzhou, People\u2019s Republic of China"}]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, People\u2019s Republic of China"}]},{"given":"Yuanzhang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, People\u2019s Republic of China"}]},{"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"ArduPilot. (2023). ArduPilot code coverage report. Retrieved January 16 2023 from https:\/\/firmware.ardupilot.org\/coverage\/"},{"key":"e_1_3_2_3_1","unstructured":"Bai S. Kolter J. Z. & Koltun V. (2018). An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv preprint arXiv:1803.01271."},{"key":"e_1_3_2_4_1","doi-asserted-by":"crossref","unstructured":"Bohme M. Pham V. T. Nguyen M. D. & Roychoudhury A. (2017). Directed greybox fuzzing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201817). Association for Computing Machinery New York NY USA pp. 2329\u20132344.","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_5_1","doi-asserted-by":"crossref","unstructured":"Chen H. Xue Y. Li Y. Chen B. Xie X. Wu X. &\u00a0Liu Y. (2018). Hawkeye: Towards a desired directed grey-box fuzzer. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201818). Association for Computing Machinery New York NY USA pp. 2095\u20132108.","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_6_1","doi-asserted-by":"crossref","unstructured":"Chen Y. Poskitt C. M. Sun J. Adepu S. & Zhang F. (2019). Learning-Guided network fuzzing for testing cyber-physical system defences. In 34th IEEE\/ACM international conference on automated software engineering (ASE) San Diego CA USA pp. 962-973.","DOI":"10.1109\/ASE.2019.00093"},{"key":"e_1_3_2_7_1","unstructured":"Fioraldi A. Maier D. Ei\u00dffeldt H. & Heuse M. (2020). AFL++: Combining incremental steps of fuzzing research. In 14th USENIX workshop on offensive technologies (WOOT\u201920) Boston marriott copley place in Boston MA USA."},{"key":"e_1_3_2_8_1","unstructured":"Geatpy. (2020). The Genetic and Evolutionary Algorithm Toolbox for Python with High Performance. Retrieved January 22 2023 from http:\/\/geatpy.com\/index.php\/home\/."},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Han R. Yang C. Ma S. Ma J. Sun C. Li J. & Elisa B. (2022). Control parameters considered harmful: Detecting range specification bugs in drone configuration modules via learning-guided search. In 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE) Pittsburgh PA USA pp. 462-473.","DOI":"10.1145\/3510003.3510084"},{"key":"e_1_3_2_10_1","doi-asserted-by":"crossref","unstructured":"Kim H. Ozmen M. O. Bianchi A. Celik Z. B. & Xu D. (2021). Pgfuzz: Policy-guided fuzzing for robotic vehicles. In network and distributed system security symposium (NDSS) San Diego CA USA.","DOI":"10.14722\/ndss.2021.24096"},{"key":"e_1_3_2_11_1","unstructured":"Kim T. Kim C. H. Rhee J. Fan F. Zhan T. Gregory W. Zhang X. Deng X. & Xu D. (2019). Rvfuzzer: Finding input validation bugs in robotic vehicles through control-guided testing. In 28th USENIX Security Symposium (USENIX Security 19) (pp. 425\u2013442). USENIX Association."},{"key":"e_1_3_2_12_1","unstructured":"Lee G. Shim W. & Lee B. (2021). Constraint-guided directed greybox fuzzing. In: 30th USENIX Security Symposium (USENIX Security 21) 3559\u20133576."},{"key":"e_1_3_2_13_1","doi-asserted-by":"crossref","unstructured":"Lemieux C. & Sen K. (2018). FairFuzz: a targeted mutation strategy for increasing greybox fuzz testing coverage. In Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering (ASE \u201818). Association for Computing Machinery New York NY USA pp. 475\u2013485.","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_14_1","unstructured":"OneFuzz. (2023). OneFuzz: A self-hosted Fuzzing-As-A-Service platform. Retrieved May 8 2023 from https:\/\/github.com\/microsoft\/onefuzz"},{"key":"e_1_3_2_15_1","doi-asserted-by":"crossref","unstructured":"Peng H. Shoshitaishvili Y. & Payer M. (2018). T-Fuzz: fuzzing by program transformation. In 2018 IEEE Symposium on Security and Privacy (SP) San Francisco CA USA pp. 697\u2013710.","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_16_1","unstructured":"Robert S. (2023). Honggfuzz: Security oriented fuzzer with powerful analysis options. Retrieved May 8 2023 form https:\/\/github.com\/google\/honggfuzz."},{"key":"e_1_3_2_17_1","unstructured":"Schumilo S. Aschermann C. Gawlik R. Schinzel S. \u00a0& Holz T. (2017). kAFL: Hardware-Assisted feedback fuzzing for OS kernels. In 26th USENIX security symposium (USENIX Security 17) Vancouver BC CAN pp. 167\u2013182."},{"key":"e_1_3_2_18_1","unstructured":"SparkFun Electronics. (2022). Retrieved August 22 2022 from https:\/\/avc.sparkfun.com\/2013"},{"key":"e_1_3_2_19_1","volume-title":"Research and implementation of drone parameter validation technique based on mixture density network and fuzzing","author":"Wang Y.","year":"2021","unstructured":"Wang, Y. (2021). Research and implementation of drone parameter validation technique based on mixture density network and fuzzing. Xidian University."},{"key":"e_1_3_2_20_1","doi-asserted-by":"crossref","unstructured":"Yan G. Lu J. Shu Z. & Kucuk Y. (2017). Exploitmeter: Combining fuzzing with machine learning for automated evaluation of software exploitability. 2017 IEEE symposium on privacy-aware computing (PAC) Washington DC USA pp. 164-175.","DOI":"10.1109\/PAC.2017.10"},{"key":"e_1_3_2_21_1","volume-title":"Research on UAV system security vulnerability discovering based on fuzzing","author":"Ye X.","year":"2020","unstructured":"Ye, X. (2020). Research on UAV system security vulnerability discovering based on fuzzing. Xidian University."}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2024.2312104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T14:59:56Z","timestamp":1734447596000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2024.2312104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,14]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1080\/09540091.2024.2312104"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2024.2312104","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"type":"print","value":"0954-0091"},{"type":"electronic","value":"1360-0494"}],"subject":[],"published":{"date-parts":[[2024,2,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-10-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2312104"}}