{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:38:29Z","timestamp":1763105909125,"version":"3.37.3"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National University of Defense Technology Research","award":["ZK20-17","ZK20-09"],"award-info":[{"award-number":["ZK20-17","ZK20-09"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272472","61902412","61902416"],"award-info":[{"award-number":["62272472","61902412","61902416"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["2021JJ40692","2019JJ50729"],"award-info":[{"award-number":["2021JJ40692","2019JJ50729"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tse.2022.3219520","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T20:28:01Z","timestamp":1667593681000},"page":"2394-2412","source":"Crossref","is-referenced-by-count":10,"title":["UltraFuzz: Towards Resource-Saving in Distributed Fuzzing"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0075-5003","authenticated-orcid":false,"given":"Xu","family":"Zhou","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3408-4153","authenticated-orcid":false,"given":"Pengfei","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Chenyifan","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7276-8735","authenticated-orcid":false,"given":"Tai","family":"Yue","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Yingying","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7672-0915","authenticated-orcid":false,"given":"Congxi","family":"Song","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Kai","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Qidi","family":"Yin","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Xu","family":"Han","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0029-9_53"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24415"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23176"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363247"},{"key":"ref8","first-page":"1099","article-title":"FIRM-AFL: High-throughput greybox fuzzing of IoT firmware via augmented process emulation","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Zheng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380388"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"article-title":"Fuzzing: Art, science, and engineering","year":"2018","author":"Manes","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.15"},{"article-title":"TOFU: Target-orienter fuzzer","year":"2020","author":"Wang","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"article-title":"V-Fuzz: Vulnerability-oriented evolutionary fuzzing","year":"2019","author":"Li","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134085"},{"article-title":"EcoFuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Yue","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"article-title":"Aflfast.new","year":"2016","author":"B\u00f6hme","key":"ref23"},{"article-title":"Fidgetyafl","year":"2016","author":"Zalewski","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409729"},{"article-title":"American fuzzy lop","year":"2015","author":"Zalewski","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"ref28","first-page":"1949","article-title":"MOPT: Optimized mutation scheduling for fuzzers","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Lyu"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936235"},{"year":"2015","key":"ref30","article-title":"Roving"},{"article-title":"Disfuzz-afl","year":"2015","author":"Bogaard","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app9235100"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"ref34","first-page":"1967","article-title":"EnFuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers","volume-title":"Proc. 28th USENIX Conf. Secur. Symp.","author":"Chen"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905744"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.27"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00034"},{"key":"ref40","first-page":"1273","article-title":"HyDiff: Hybrid differential software analysis","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Noller"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464817"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00044"},{"article-title":"Binary-level directed fuzzing for use-after-free vulnerabilities","year":"2020","author":"Nguyen","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4129684"},{"key":"ref45","first-page":"167","article-title":"kAFL: Hardware-assisted feedback fuzzing for OS kernels","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Schumilo"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851237"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329828"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427266"},{"key":"ref50","first-page":"1032","article-title":"Coverage-based greybox fuzzing as Markov chain","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Pham"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24314"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref53","first-page":"745","article-title":"QSYM: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Yun"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"article-title":"Using grid computing for large scale fuzzing","year":"2010","author":"Xie","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3239576.3239615"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10103953\/09939114.pdf?arnumber=9939114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T17:48:36Z","timestamp":1717091316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9939114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":56,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3219520","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}