{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:27Z","timestamp":1773511047026,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/ipccc47392.2019.8958740","type":"proceedings-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T21:04:32Z","timestamp":1579208672000},"page":"1-8","source":"Crossref","is-referenced-by-count":17,"title":["An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis"],"prefix":"10.1109","author":[{"given":"Yaowen","family":"Zheng","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences,School of Cyber Security,China"}]},{"given":"Zhanwei","family":"Song","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China"}]},{"given":"Yuyan","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China"}]},{"given":"Kai","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences,School of Cyber Security,China"}]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences,School of Cyber Security,China"}]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences,School of Cyber Security,China"}]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Hex-Rays About IDA"},{"key":"ref11","year":"0","journal-title":"Binwalk firmware analysis tool"},{"key":"ref12","year":"0","journal-title":"uClibc - official site"},{"key":"ref13","year":"0","journal-title":"uClibc mirror"},{"key":"ref14","first-page":"1032","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref15","year":"0","journal-title":"IDAPython project for Hex-Ray&#x2019;s IDA Pro"},{"key":"ref16","year":"0","journal-title":"Firmadyne datasheet"},{"key":"ref17","author":"fratric","year":"0","journal-title":"WinAFL A fork of AFL for fuzzing Windows binaries"},{"key":"ref18","year":"0","journal-title":"honggfuzz a security oriented feedback-driven evolutionary easy-to-use fuzzer with interesting analysis options"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"ref4","author":"zalewski","year":"0","journal-title":"American Fuzzy Lop"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref2","year":"0","journal-title":"FuzzingTools"},{"key":"ref9","year":"2017","journal-title":"TriforceAFL"},{"key":"ref1","year":"2017","journal-title":"Gartner says 8 4 billion connected &#x201C;things&#x201D; will be in use in 2017 up 31 percent from 2016"},{"key":"ref20","year":"2016","journal-title":"BooFuzz"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818035"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843867"},{"key":"ref24","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"}],"event":{"name":"2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)","location":"London, UK","start":{"date-parts":[[2019,10,29]]},"end":{"date-parts":[[2019,10,31]]}},"container-title":["2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8955479\/8958711\/08958740.pdf?arnumber=8958740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:21:53Z","timestamp":1756754513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8958740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ipccc47392.2019.8958740","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}