{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:35Z","timestamp":1762005095060,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502536","61872836"],"award-info":[{"award-number":["61502536","61872836"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB0802900"],"award-info":[{"award-number":["2017YFB0802900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2894178","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:51:28Z","timestamp":1548291088000},"page":"22434-22444","source":"Crossref","is-referenced-by-count":5,"title":["InsFuzz: Fuzzing Binaries With Location Sensitivity"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1808-7864","authenticated-orcid":false,"given":"Hanfang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Anmin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Luping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinxin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Not all bytes are equal Neural byte sieve for fuzzing","year":"2017","author":"rajpal","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"journal-title":"Fuzzing The State of the Art","year":"2012","author":"mcnally","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/978-3-642-22110-1_49","article-title":"KLOVER: A symbolic execution and automatic test generation tool for C++ programs","author":"li","year":"2011","journal-title":"Proc Int Conf Comput Aided Verification"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"ref35","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"godefroid","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref34","first-page":"67","article-title":"Dynamic test generation to find integer bugs in \n$\\times86$\n binary Linux Programs","author":"molnar","year":"2009","journal-title":"Proc 18th USENIX Secur Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"20:20","DOI":"10.1145\/2090147.2094081","article-title":"SAGE: Whitebox fuzzing for security testing","volume":"10","author":"godefroid","year":"2012","journal-title":"Queue"},{"journal-title":"Dyninst API","year":"2016","key":"ref2"},{"journal-title":"Binary fuzzing strategies what works what doesn't","year":"2014","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"journal-title":"IDAPython","year":"2018","key":"ref10"},{"journal-title":"Technical &#x2018;Whitepaper&#x2019; for AFL-Fuzz","year":"2018","key":"ref11"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23404","article-title":"VUzzer: Application-aware evolutionary fuzzing","author":"rawat","year":"2017","journal-title":"Proc 24th Annu Netw Distrib Syst Security Symp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.182"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"journal-title":"Deep Reinforcement","year":"2018","author":"b\u00f6ttinger","key":"ref14"},{"key":"ref15","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proc USENIX Symp Operat Syst Des Implement"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884843"},{"journal-title":"LAF-LLVM-Pass","year":"2016","key":"ref4"},{"journal-title":"Laf-Intel Circumventing Fuzzing Roadblocks With Compiler Transformations","year":"2016","key":"ref3"},{"journal-title":"American Fuzzy Lop (2 52b)","year":"2017","author":"zalewski","key":"ref6"},{"journal-title":"FidgetyAFL","year":"2016","author":"zalewski","key":"ref5"},{"journal-title":"AFL-Dyninst","year":"2015","key":"ref8"},{"journal-title":"Michael Rash AFL-COV","year":"2014","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"journal-title":"Dyninst","year":"2018","key":"ref9"},{"journal-title":"Fuzzing Brute Force Vulnerability Discovery","year":"2007","author":"sutton","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"ref41","first-page":"861","article-title":"Optimizing seed selection for fuzzing","author":"rebert","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref43","first-page":"263","article-title":"CUTE: A concolic unit testing engine for C","author":"sen","year":"2005","journal-title":"Proc 10th Eur Softw Eng Conf 13th ACM SIGSOFT Int Symp Found Softw Eng"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08624255.pdf?arnumber=8624255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:50:33Z","timestamp":1643262633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8624255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2894178","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}