{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:35:43Z","timestamp":1773300943672,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272442"],"award-info":[{"award-number":["62272442"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902374"],"award-info":[{"award-number":["61902374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736208"],"award-info":[{"award-number":["U1736208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Innovation Funding of the Institute of Computing Technology, Chinese Academy of Sciences,","doi-asserted-by":"publisher","award":["E161040"],"award-info":[{"award-number":["E161040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3562704","type":"journal-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T13:38:50Z","timestamp":1745329130000},"page":"5224-5239","source":"Crossref","is-referenced-by-count":2,"title":["Yesterday Once MorE: Facilitating Linux Kernel Bug Reproduction via <i>Reverse Fuzzing<\/i>"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4671-6093","authenticated-orcid":false,"given":"Xingwei","family":"Li","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3439-551X","authenticated-orcid":false,"given":"Yan","family":"Kang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1777-8110","authenticated-orcid":false,"given":"Chenggang","family":"Wu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Danjun","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5697-5600","authenticated-orcid":false,"given":"Jiming","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1151-0838","authenticated-orcid":false,"given":"Yue","family":"Sun","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Zehui","family":"Wu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"given":"Yunchao","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4791-6847","authenticated-orcid":false,"given":"Rongkuan","family":"Ma","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4891-8657","authenticated-orcid":false,"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref2","volume-title":"CVE-2024-26774","author":"Chen","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00269"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref5","first-page":"5003","article-title":"ACTOR: Action-guided kernel fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Fleischer"},{"key":"ref6","volume-title":"Reproduce","year":"2023"},{"key":"ref7","volume-title":"Syzbot","year":"2024"},{"key":"ref8","volume-title":"Codeql","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510126"},{"key":"ref10","first-page":"2921","article-title":"ReUSB: Replay-Guided USB driver fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Jang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833593"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359662"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24935"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833683"},{"key":"ref15","volume-title":"Linux Kernel CVEs","year":"2023"},{"key":"ref16","first-page":"919","article-title":"Understanding the reproducibility of crowd-reported security vulnerabilities","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Mu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24159"},{"key":"ref18","article-title":"Syzbot: 7 years of continuous kernel fuzzing","volume-title":"Proc. Linux Plumbers Conf.","author":"Nogikh","year":"2023"},{"key":"ref19","first-page":"2559","article-title":"USBFuzz: A framework for fuzzing USB drivers by device emulation","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Peng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3678890.3678891"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179366"},{"key":"ref22","first-page":"2597","article-title":"Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Schumilo"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"ref24","first-page":"1275","article-title":"Drifuzz: Harvesting bugs in device drivers from golden seeds","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Shen"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483547"},{"key":"ref26","volume-title":"Syzdirect Dataset","author":"Tan","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623146"},{"key":"ref28","volume-title":"Syzkaller","author":"Vyukov","year":"2024"},{"key":"ref29","volume-title":"All: Snapshot-Based Fuzzing","year":"2023"},{"key":"ref30","first-page":"2741","article-title":"SyzVegas: Beating kernel fuzzing odds with reinforcement learning","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Wang"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23131"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00051"},{"key":"ref34","first-page":"2849","article-title":"DDRace: Finding concurrency UAF vulnerabilities in Linux drivers with directed fuzzing","volume-title":"Proc. USENIX Secur. Symp.","author":"Yuan"},{"key":"ref35","first-page":"3201","article-title":"SyzScope: Revealing high-risk security impacts of fuzzer-exposed bugs in Linux kernel","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Zou"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454101"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10974508.pdf?arnumber=10974508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:51:29Z","timestamp":1755910289000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10974508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3562704","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}