{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:28:04Z","timestamp":1768314484243,"version":"3.49.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,24]]},"DOI":"10.1109\/dsa66321.2025.00017","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:20Z","timestamp":1768242020000},"page":"44-54","source":"Crossref","is-referenced-by-count":0,"title":["JMFUZZ: Firmware Fuzzing Using Temporal-Aware Multi-Stream Co-Mutation"],"prefix":"10.1109","author":[{"given":"Jiangyun","family":"Xu","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jinbo","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"}]},{"given":"Yunyun","family":"Ma","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"}]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"}]},{"given":"Yu","family":"Su","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-022-00123-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3538644"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232966"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"ref5","volume-title":"AFL (american fuzzy lop)","author":"Zalewski","year":"2010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453093"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427294"},{"key":"ref9","first-page":"1099","article-title":"Firm-afl:high-throughput greybox fuzzing of iot firmware via augmented process emulation","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zheng","year":"2019"},{"key":"ref10","first-page":"1237","article-title":"P2im: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Feng","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00018"},{"key":"ref12","first-page":"1239","article-title":"Fuzzware: Using precise mmio modeling for effective firmware fuzzing","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Scharnowski","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3339569"},{"key":"ref14","article-title":"Hoedur: Embedded firmware fuzzing using multi-stream inputs","volume-title":"32st USENIX Security Symposium (USENIX Security 23)","author":"Scharnowski","year":"2023"},{"key":"ref15","first-page":"5359","article-title":"Multifuzz: A multi-stream fuzzer for testing monolithic firmware","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Chesser","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056179"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref20","volume-title":"Contiki-ng.","year":"2020"},{"key":"ref21","volume-title":"Zephyr project","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"ref24","article-title":"Afl++: Combining incremental steps of fuzzing research","volume-title":"14th USENIX workshop on offensive technologies (WOOT 20)","author":"Fioraldi","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref27","first-page":"1949","article-title":"Mopt: Optimized mutation scheduling for fuzzers","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Lyu","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"ref29","article-title":"Ems: History-driven mutation for coveragebased fuzzing","author":"Lyu","year":"2022","journal-title":"NDSS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564659"},{"key":"ref31","first-page":"2307","article-title":"Ecofuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yue","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/math9030205"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24314"},{"key":"ref34","first-page":"841","article-title":"Mtsan: A feasible and practical memory sanitizer for fuzzing cots binaries","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen","year":"2023"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639172"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690320"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590301"},{"key":"ref42","first-page":"1201","article-title":"Halucinator: Firmware re-hosting through abstraction layer emulation","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Clements","year":"2020"},{"key":"ref43","first-page":"2007","article-title":"Automatic firmware emulation through invalidity-guided knowledge inference","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zhou","year":"2021"}],"event":{"name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","location":"Sharjah, United Arab Emirates","start":{"date-parts":[[2025,11,24]]},"end":{"date-parts":[[2025,11,26]]}},"container-title":["2025 12th International Conference on Dependable Systems and Their Applications (DSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11320275\/11320347\/11320378.pdf?arnumber=11320378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:37:12Z","timestamp":1768293432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/dsa66321.2025.00017","relation":{},"subject":[],"published":{"date-parts":[[2025,11,24]]}}}