{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:28:44Z","timestamp":1771518524334,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,22]]},"DOI":"10.1109\/icsrs59833.2023.10381445","type":"proceedings-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T19:33:05Z","timestamp":1704742385000},"page":"439-448","source":"Crossref","is-referenced-by-count":2,"title":["Squashing Resource Exhaustion Bugs with Black-Box Fuzzing and Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Leon","family":"Fernandez","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology,Centre for Cyber Defence and Information Security,Stockholm,Sweden"}]},{"given":"Gunnar","family":"Karlsson","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Centre for Cyber Defence and Information Security,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"MITRE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref4","article-title":"AFL++: Combining incremental steps of fuzzing research","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2023.3286443"},{"key":"ref6","volume-title":"American Fuzzy Lop","author":"Zalewski","year":"2017"},{"key":"ref7","first-page":"1","article-title":"IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery","year":"2016","journal-title":"IEEE Std 802.1AB-2016 (Revision of IEEE Std 802.1AB-2009)"},{"key":"ref8","volume-title":"","year":"2023"},{"key":"ref9","article-title":"Reinforcement learning: an introduction","volume-title":"Adaptive computation and machine learning series","author":"Sutton","year":"2018"},{"issue":"14","key":"ref10","first-page":"2023","article-title":"Efficient grammar fuzzing","volume":"14","author":"Zeller","year":"2023","journal-title":"The Fuzzing Book"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3047766"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3511900"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00046"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"ref17","volume-title":"(2023, June) Defensics Fuzz Testing","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35413-2_16"},{"key":"ref19","article-title":"Fuzzing for Humans: Real Fuzzing in the Real World","volume-title":"DEF CON 24","author":"Pereyda","year":"2016, August"},{"key":"ref20","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"Amini","year":"2007"},{"key":"ref21","article-title":"The Advantages of Block-Based Protocol Analysis for Security Testing","volume-title":"Immunity, Inc.","author":"Aitel","year":"2002, February"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3580598"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00070"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3013716"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"}],"event":{"name":"2023 7th International Conference on System Reliability and Safety (ICSRS)","location":"Bologna, Italy","start":{"date-parts":[[2023,11,22]]},"end":{"date-parts":[[2023,11,24]]}},"container-title":["2023 7th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10380806\/10380972\/10381445.pdf?arnumber=10381445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:02:12Z","timestamp":1706076132000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10381445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icsrs59833.2023.10381445","relation":{},"subject":[],"published":{"date-parts":[[2023,11,22]]}}}