{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:15:50Z","timestamp":1774541750748,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2023ZD034"],"award-info":[{"award-number":["2023ZD034"]}]},{"name":"Major Key Project of PCL","award":["PCL2023A06-4"],"award-info":[{"award-number":["PCL2023A06-4"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tce.2025.3525512","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T14:22:44Z","timestamp":1735914164000},"page":"9170-9181","source":"Crossref","is-referenced-by-count":2,"title":["DetecVFuzz: Enhancing Security in Consumer Electronic Devices Through Scalable Vulnerability Testing of Virtual Devices"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1521-9542","authenticated-orcid":false,"given":"Xi","family":"Xiao","sequence":"first","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9279-3010","authenticated-orcid":false,"given":"Yongjian","family":"Guo","sequence":"additional","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7818-459X","authenticated-orcid":false,"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, Flinders University, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6146-6419","authenticated-orcid":false,"given":"Chuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, National Supercomputer Center in Jinan, Qilu University of Technology, Shandong Academy of Sciences, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1042-837X","authenticated-orcid":false,"given":"Mohammad Sayad","family":"Haghighi","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"given":"Yuanyi","family":"Lin","sequence":"additional","affiliation":[{"name":"Shenzhen International Graduate School, Tsinghua University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622262"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3297965"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100500"},{"issue":"1","key":"ref4","first-page":"61","article-title":"A novel venom attack identification mechanism in cloud virtualization environment","volume":"24","author":"Abdoul-Kader","year":"2018","journal-title":"Commun. CCISA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3323621"},{"key":"ref11","first-page":"4265","article-title":"Detecting union type confusion in component object model","volume-title":"Proc. 32nd USENIX Security Symp. (USENIX Security)","author":"Zhang"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3038142"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23096"},{"key":"ref16","first-page":"2597","article-title":"NYX: Greybox hypervisor fuzzing using fast snapshots and affine types","volume-title":"Proc. USENIX Security Symp.","author":"Schumilo"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"ref21","first-page":"1967","article-title":"EnFuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers","volume-title":"Proc. USENIX Security Symp.","author":"Chen"},{"key":"ref22","first-page":"861","article-title":"Optimizing seed selection for fuzzing","volume-title":"Proc. 23rd USENIX Security Symp.","author":"Rebert"},{"key":"ref23","first-page":"745","article-title":"QSYM: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. 27th USENIX Security Symp.","author":"Yun"},{"key":"ref24","first-page":"2541","article-title":"Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints","volume-title":"Proc. 29th USENIX Conf. Security Symp.","author":"Song"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23176"},{"key":"ref26","first-page":"2559","article-title":"USBFuzz: A framework for fuzzing USB drivers by device emulation","volume-title":"Proc. 29th USENIX Conf. Security Symp.","author":"Peng"},{"key":"ref27","first-page":"10","article-title":"AFL++ combining incremental steps of fuzzing research","volume-title":"Proc. 14th USENIX Conf. Offensive Technol.","author":"Fioraldi"},{"key":"ref28","first-page":"1","article-title":"LLVM and clang: Next generation compiler technology","volume-title":"Proc. BSD Conf.","volume":"5","author":"Lattner"},{"key":"ref29","first-page":"309","article-title":"AddressSanitizer: A fast address sanity checker","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Serebryany"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1176\/2\/022013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref34","first-page":"167","article-title":"kAFL: Hardware-Assisted feedback fuzzing for OS kernels","volume-title":"Proc. 26th USENIX Security Symp.","author":"Schumilo"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref41","first-page":"1","article-title":"HALucinator: Firmware re-hosting through abstraction layer emulation","volume-title":"Proc. 29th USENIX Security Symp.","author":"Clements"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105860"},{"key":"ref43","first-page":"1","article-title":"Lowering the USB fuzzing barrier by transparent two-way emulation","volume-title":"Proc. WOOT","author":"Van Tonder"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2628194.2628195"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510228"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11241057\/10820948.pdf?arnumber=10820948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:31:02Z","timestamp":1766514662000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10820948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":47,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3525512","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}