{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:52:21Z","timestamp":1770342741678,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003696","name":"The Affiliated Institute of Electronics and Telecommunications Research Institute","doi-asserted-by":"publisher","award":["2023-062"],"award-info":[{"award-number":["2023-062"]}],"id":[{"id":"10.13039\/501100003696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean Government [Ministry of Science and ICT (MSIT)]","award":["2021R1F1A1049957"],"award-info":[{"award-number":["2021R1F1A1049957"]}]},{"DOI":"10.13039\/501100003661","name":"Korea Institute for Advancement of Technology (KIAT) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003052","name":"Korean Government through Ministry of Trade, Industry and Energy (MOTIE)","doi-asserted-by":"publisher","award":["P0008703"],"award-info":[{"award-number":["P0008703"]}],"id":[{"id":"10.13039\/501100003052","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MSIT under the ICAN [Information and Communications Technology (ICT) Challenge and Advanced Network of Human Resource Development (HRD)] Program"},{"name":"Institute of Information and Communication Technology Planning and Evaluation","award":["IITP-2022-RS-2022-00156310"],"award-info":[{"award-number":["IITP-2022-RS-2022-00156310"]}]},{"name":"Convergence security core talent training business support program","award":["IITP-2023-RS-2023-00266615"],"award-info":[{"award-number":["IITP-2023-RS-2023-00266615"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3297888","type":"journal-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:36:26Z","timestamp":1689960986000},"page":"77608-77619","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzability Testing Framework for Incomplete Firmware Binary"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2418-5850","authenticated-orcid":false,"given":"Jiwon","family":"Jang","sequence":"first","affiliation":[{"name":"Future Convergence Technology Engineering, Sungshin Women&#x2019;s University, Seoul, Republic of Korea"}]},{"given":"Gyeongjin","family":"Son","sequence":"additional","affiliation":[{"name":"Convergence Security Engineering, Sungshin Women&#x2019;s University, Seoul, Republic of Korea"}]},{"given":"Hyeonsu","family":"Lee","sequence":"additional","affiliation":[{"name":"Convergence Security Engineering, Sungshin Women&#x2019;s University, Seoul, Republic of Korea"}]},{"given":"Heesun","family":"Yun","sequence":"additional","affiliation":[{"name":"Convergence Security Engineering, Sungshin Women&#x2019;s University, Seoul, Republic of Korea"}]},{"given":"Deokjin","family":"Kim","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"given":"Sangwook","family":"Lee","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"given":"Seongmin","family":"Kim","sequence":"additional","affiliation":[{"name":"Convergence Security Engineering, Sungshin Women&#x2019;s University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1844-0490","authenticated-orcid":false,"given":"Daehee","family":"Jang","sequence":"additional","affiliation":[{"name":"School of Computing, Kyunghee University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1","article-title":"Unicorefuzz: On the viability of emulation for kernelspace fuzzing","author":"maier","year":"2019","journal-title":"Proc 13th USENIX Workshop Offensive Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5756"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714912"},{"key":"ref14","first-page":"321","article-title":"Jetset: Targeted firmware rehosting for embedded systems","author":"johnson","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218694"},{"key":"ref10","first-page":"191","article-title":"Forensic analysis of mobile phone internal memory","author":"willassen","year":"2005","journal-title":"Proc IFIP Int Conf Digit Forensics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"ref16","first-page":"1683","article-title":"Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing","author":"nagy","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCET48361.2019.8989335"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338934"},{"key":"ref48","year":"2023","journal-title":"Framework for Automating Fuzzable Target Discovery With Static Analysis"},{"key":"ref47","article-title":"Selective symbolic execution","author":"chipounov","year":"2009","journal-title":"Proc 5th Workshop Hot Topics Syst Dependability (HotDep)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00035"},{"key":"ref41","first-page":"2271","article-title":"FuzzGen: Automatic fuzzer generation","author":"ispoglou","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref44","first-page":"388","article-title":"One fuzz doesn&#x2019;t fit all: Optimizing directed fuzzing via target-tailored program state restriction","author":"srivastava","year":"2022","journal-title":"Proc 38th Annu Comput Secur Appl Conf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23136"},{"key":"ref8","first-page":"167","article-title":"kAFL: Hardware-assisted feedback fuzzing for OS kernels","author":"schumilo","year":"2017","journal-title":"Proc 26th USENIX Secur Symp"},{"key":"ref7","year":"2015","journal-title":"Syzkaller&#x2014;Kernel Fuzzer"},{"key":"ref9","first-page":"729","article-title":"MoonShine: Optimizing OS fuzzer seed selection with trace distillation","author":"pailoor","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00067"},{"key":"ref3","author":"serebryany","year":"2016","journal-title":"Sanitize fuzz and harden your C++ code"},{"key":"ref6","first-page":"445","article-title":"Fuzzing with code fragments","author":"holler","year":"2012","journal-title":"Proc 21st USENIX Secur Symp"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00109"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399360"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2021.23003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3013675"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24365"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00019"},{"key":"ref30","first-page":"2811","article-title":"APICraft: Fuzz driver generation for closed-source SDK libraries","author":"zhang","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397372"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102497"},{"key":"ref2","year":"2015","journal-title":"libFuzzer-A Library for Coverage-guided Fuzz Testing"},{"key":"ref1","author":"zalewski","year":"2014","journal-title":"American Fuzzy Lop"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.08.001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00087"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref23","first-page":"2007","article-title":"Automatic firmware emulation through invalidity-guided knowledge inference","author":"zhou","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref26","year":"2007","journal-title":"Ardupilot Main Community"},{"key":"ref25","first-page":"1201","article-title":"HALucinator: Firmware re-hosting through abstraction layer emulation","author":"clements","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358616"},{"key":"ref21","first-page":"1099","article-title":"FIRM-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation","author":"zheng","year":"2019","journal-title":"Proc 28th USENIX Secur Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref27","year":"2021","journal-title":"Open-source Autopilot"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24334"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10189855.pdf?arnumber=10189855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T18:02:50Z","timestamp":1692640970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10189855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3297888","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}