{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:44:02Z","timestamp":1740177842269,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772148"],"award-info":[{"award-number":["61772148"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Green Commun. Netw."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/tgcn.2021.3068466","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T19:28:38Z","timestamp":1616614118000},"page":"1041-1050","source":"Crossref","is-referenced-by-count":1,"title":["Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0647-4747","authenticated-orcid":false,"given":"Xiaogang","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"149","article-title":"A comparison of publicly available tools for dynamic buffer overflow prevention","volume":"3","author":"wilander","year":"2003","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"journal-title":"National Institute of Standards and Technology","year":"2018","key":"ref32"},{"journal-title":"Lung Technology","year":"2017","key":"ref31"},{"journal-title":"Standard Performance Evaluation Corporation","year":"2018","key":"ref30"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029911"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3008826"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"ref19","first-page":"49","article-title":"Dowsing for overflows: A guided fuzzer to find buffer boundary violations","author":"haller","year":"0"},{"journal-title":"fuzzer-test-suite","year":"2018","key":"ref28"},{"key":"ref4","first-page":"135","article-title":"Toward the analysis of embedded firmware through automated re-hosting","author":"gustafson","year":"2019","journal-title":"Proc 22nd Int Symp Res Attacks Intrusions Defenses"},{"key":"ref27","first-page":"1","article-title":"A call for a public bug and tool registry","author":"foster","year":"2005","journal-title":"Proc Workshop Eval Softw Defect Detect Tools"},{"key":"ref3","first-page":"1099","article-title":"Firm-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation","author":"zheng","year":"2019","journal-title":"Proc 28th USENIX Security Symp (USENIX Security)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167488"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref7","article-title":"Intelligent trust-based public key management for IoT by linking edge devices in a fog architecture","author":"sayad haghighi","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref2","first-page":"1201","article-title":"Halucinator: Firmware re-hosting through abstraction layer emulation","author":"clements","year":"2020","journal-title":"Proc 29th USENIX Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329845"},{"key":"ref20","first-page":"167","article-title":"kAFL: Hardware-assisted feedback fuzzing for os kernels","author":"schumilo","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183494"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref26","first-page":"1","article-title":"BugBench: Benchmarks for evaluating bug detection tools","author":"lu","year":"2005","journal-title":"Proc Workshop Eval Softw Defect Detect Tools"},{"key":"ref25","first-page":"1","article-title":"Bug specimens are important","author":"spacco","year":"2005","journal-title":"Proc Workshop Eval Softw Defect Detect Tools"}],"container-title":["IEEE Transactions on Green Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7511293\/9520384\/09385390.pdf?arnumber=9385390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:08Z","timestamp":1652194448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9385390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":36,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tgcn.2021.3068466","relation":{},"ISSN":["2473-2400"],"issn-type":[{"type":"electronic","value":"2473-2400"}],"subject":[],"published":{"date-parts":[[2021,9]]}}}