{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:36:19Z","timestamp":1769726179782,"version":"3.49.0"},"reference-count":97,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179438","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"2708-2725","source":"Crossref","is-referenced-by-count":3,"title":["Finding Specification Blind Spots via Fuzz Testing"],"prefix":"10.1109","author":[{"given":"Ru","family":"Ji","sequence":"first","affiliation":[{"name":"University of Waterloo"}]},{"given":"Meng","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328737"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06773-0_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17"},{"key":"ref6","volume-title":"Move: A language with programmable resources","author":"Blackshear","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833735"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref9","article-title":"Users guide to the pilot mutation system","volume":"114","author":"Budd","year":"1977","journal-title":"Yale University, New Haven, Connecticut, Technique Report"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(85)90011-6"},{"key":"ref11","volume-title":"Mutation Analysis of Program Test Data","author":"Alan Budd","year":"1980"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2527269.2527277"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace5010010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ase.2002.1115027"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"issue":"4","key":"ref16","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1023\/A:1008978021407","article-title":"Mutation testing applied to estelle specifications","volume":"8","author":"Do Rocio","year":"1999","journal-title":"Software Quality Journal"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1996.558719"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.07.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2014.6987586"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642963"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99524-9_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678571"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24224"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48869-1_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59762-7_8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1999.809326"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372619"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iccad.2017.8203847"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714883"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37036-6_8"},{"key":"ref32","article-title":"{AFL++}: Combining Incremental Steps of Fuzzing Research","volume-title":"Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT)","author":"Fioraldi"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20652-9_10"},{"key":"ref34","volume-title":"What4: New library to help developers build verification and program analysis tools","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-2007-4_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.47"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2003.1210044"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107233"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/sym10100460"},{"key":"ref42","article-title":"The coq proof assistant a tutorial","volume":"178","author":"Huet","year":"1997","journal-title":"Rapport Technique"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_4"},{"key":"ref44","article-title":"jFuzz: A concolic Whitebox Fuzzer for Java","volume-title":"Proceedings of the 1st NASA Formal Methods Symposium (NFM)","author":"Jayaraman"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/307988.307989"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138820"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45732-1_12"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2008.ECP.29"},{"key":"ref51","article-title":"On the Duality between Vacuity and Coverage","volume-title":"Technical Report UCB\/EECS-2008-26","author":"Kupferman","year":"2008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17511-4_20"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538814"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/349360.351140"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107453"},{"key":"ref56","article-title":"{MOPT}: Optimized Mutation Scheduling for Fuzzers","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security)","author":"Lyu"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_19"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1534"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/990010.990012"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1793"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90870-6_21"},{"key":"ref65","article-title":"Mdroid+: A Mutation Testing Framework for Android","volume-title":"Proceedings of the 40th International Conference on Software Engineering: Companion (ICSE-Companion)","author":"Moran"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.43"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763832"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-18625-5_58"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/APACE.2005.1607831"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/125489.125473"},{"key":"ref71","volume-title":"Specification Mutation for Test Generation and Analysis","author":"Okun","year":"2004"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3485529"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00067"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1994.341378"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.38"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6149-3_11"},{"key":"ref80","volume-title":"Introducing s2n-tls, a new open source tls implementation","author":"Schmidt","year":"2022"},{"key":"ref81","article-title":"{Kafl} : {Hardware-Assisted} Feedback Fuzzing for {OS} Kernels","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Schumilo"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05089-3_34"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24704-3_13"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3302504.3311802"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/54.936247"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2000.857100"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_8"},{"key":"ref88","author":"Vyukov","year":"2015","journal-title":"Syzkaller"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370050103"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1099-1689(200003)10:1<3::aid-stvr196>3.0.co;2-p"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71067-7_7"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3428261"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385985"},{"key":"ref95","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5939-6","volume-title":"Mutation Testing for the New Century","volume":"24","author":"Eric Wong","year":"2001"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-941-1.ch012"},{"key":"ref97","author":"Zalewski","year":"2017","journal-title":"American fuzzy lop"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179438.pdf?arnumber=10179438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:16:40Z","timestamp":1721452600000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":97,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179438","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}