{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T05:59:42Z","timestamp":1777874382510,"version":"3.51.4"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10889404","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:02Z","timestamp":1741799702000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["FeedbackFuzz: Fuzzing Processors via Intricate Program Generation with Feedback Engine"],"prefix":"10.1109","author":[{"given":"Jiashun","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]},{"given":"Renhai","family":"Dong","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Computer Science,Beijing,China"}]},{"given":"Rundi","family":"Zhai","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Cyberspace Security,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"971","article-title":"Branch history injection: On the effectiveness of hardware mitigations against {Cross-Privilege} spectre-v2 attacks","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Barberis"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179399"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354252"},{"key":"ref6","first-page":"3825","article-title":"{RETBLEED}: Arbitrary speculative code execution with return instructions","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wikner"},{"key":"ref7","volume-title":"Comprehensive functional verification: The complete industry cycle.","author":"Wile","year":"2005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218572"},{"key":"ref9","first-page":"213","article-title":"{HardFails}: insights into {software-exploitable} hardware bugs","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Dessouky"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694366"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364684"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2024723.2000087"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203772"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993512"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541947"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694372"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530340"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774771"},{"key":"ref20","first-page":"1361","article-title":"{HyPFuzz}:{Formal-Assisted} processor fuzzing","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FDL50818.2020.9232941"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00103"},{"key":"ref23","article-title":"Thehuzz: Instruction fuzzing of processors using golden-reference models for finding software-exploitable vulnerabilities","author":"Tyagi","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323913"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137024"},{"key":"ref26","first-page":"1307","article-title":"{MorFuzz}: Fuzzing processor via runtime instruction morphing enhanced synchronizable co-simulation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Xu"},{"key":"ref27","first-page":"1","article-title":"Cascade: Cpu fuzzing via intricate program generation","volume-title":"Proc. 33rd USENIX Secur. Symp","author":"Solt"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833774"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10889404.pdf?arnumber=10889404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:43:51Z","timestamp":1777578231000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10889404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10889404","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}