{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:17:18Z","timestamp":1767928638454,"version":"3.49.0"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"CNKLSTISS"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tdsc.2023.3253120","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T18:50:20Z","timestamp":1678128620000},"page":"325-339","source":"Crossref","is-referenced-by-count":14,"title":["Multiple Targets Directed Greybox Fuzzing"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6877-780X","authenticated-orcid":false,"given":"Hongliang","family":"Liang","sequence":"first","affiliation":[{"name":"Trusted Software and Intelligent System Laboratory, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7271-3409","authenticated-orcid":false,"given":"Xinglin","family":"Yu","sequence":"additional","affiliation":[{"name":"Trusted Software and Intelligent System Laboratory, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xianglin","family":"Cheng","sequence":"additional","affiliation":[{"name":"Trusted Software and Intelligent System Laboratory, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Trusted Software and Intelligent System Laboratory, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]}],"member":"263","reference":[{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"ref13","article-title":"American fuzzy lop","author":"Zalewski","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00044"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054807"},{"key":"ref17","first-page":"745","article-title":"QSYM: EA practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Yun"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"ref21","first-page":"2577","article-title":"GREYONE: Data flow sensitive fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Gan"},{"key":"ref22","first-page":"2289","article-title":"ParmeSan: Sanitizer-guided greybox fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"\u00d6sterlund"},{"key":"ref23","first-page":"999","article-title":"Typestate-guided fuzzer for discovering use-after-free vulnerabilities","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Wang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7698916"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref27","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proc. 8th USENIX Symp. Operating Syst. Des. Implementation","author":"Cadar"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref29","article-title":"Peach fuzzer: Discover unknown vulnerabilities","year":"2016"},{"key":"ref30","first-page":"2307","article-title":"EcoFuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit","volume-title":"USENIX Secur. Symp.","author":"Yue"},{"key":"ref31","first-page":"3559","article-title":"Constraint-guided directed greybox fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Gwangmu"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref33","article-title":"FairFuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage","author":"Lemieux","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/0203006"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2961339"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510197"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833751"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2307\/1165329"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2487274"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref54","first-page":"1273","article-title":"HyDiff: Hybrid differential software analysis","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Noller"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10400751\/10061233.pdf?arnumber=10061233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:47:28Z","timestamp":1705542448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10061233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3253120","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}