{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T21:46:53Z","timestamp":1754603213602,"version":"3.37.3"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key R&#x0026;D Program of Zhejiang Province","award":["2022C01165"],"award-info":[{"award-number":["2022C01165"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U21A20464"],"award-info":[{"award-number":["U21A20464"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hong Kong RGC Project","award":["PolyU15224121"],"award-info":[{"award-number":["PolyU15224121"]}]},{"name":"HKPolyU","award":["1-ZVG0"],"award-info":[{"award-number":["1-ZVG0"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tse.2024.3406900","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T17:37:23Z","timestamp":1718213843000},"page":"2786-2806","source":"Crossref","is-referenced-by-count":1,"title":["Examiner-Pro: Testing Arm Emulators Across Different Privileges"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2196-6894","authenticated-orcid":false,"given":"Muhui","family":"Jiang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9048-1930","authenticated-orcid":false,"given":"Xiaoye","family":"Zheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0178-0171","authenticated-orcid":false,"given":"Rui","family":"Chang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-4736","authenticated-orcid":false,"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong polytechnic university, Hong Kong SAR, China"}]}],"member":"263","reference":[{"year":"2024","key":"ref1","article-title":"64 bit juno r2 arm\u00ae development platform"},{"key":"ref2","first-page":"31","article-title":"DECAF++: Elastic whole-system dynamic taint analysis","volume-title":"Proc. 22nd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Davanian","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"ref4","first-page":"569","article-title":"DroidScope: Seamlessly reconstructing the $\\{${OS$\\}$} and Dalvik semantic views for dynamic android malware analysis","volume-title":"Proc. 21st USENIX Secur. Symp.","author":"Yan","year":"2012"},{"key":"ref5","article-title":"Safe and automated live malware experimentation on public testbeds","volume-title":"Proc. 7th Workshop Cyber Secur. Exp. Test","author":"Alwabel","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23483"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698752"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664248"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.56"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427294"},{"key":"ref14","first-page":"321","article-title":"Jetset: Targeted firmware rehosting for embedded systems","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Johnson","year":"2021"},{"key":"ref15","article-title":"One engine to serve\u2019em all: Inferring taint rules without architectural semantics","volume-title":"Proc. 26th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Chua","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00054"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"year":"2024","key":"ref18","article-title":"QEMU"},{"year":"2024","key":"ref19","article-title":"Unicorn"},{"year":"2024","key":"ref20","article-title":"angr"},{"year":"2024","key":"ref21","article-title":"AFL QEMU mode: High-performance binary-only instrumentation for AFL-fuzz"},{"key":"ref22","article-title":"Unicorefuzz: On the viability of emulation for kernelspace fuzzing","volume-title":"Proc. 13th USENIX Workshop Offensive Technol.","author":"Maier","year":"2019"},{"key":"ref23","first-page":"1099","article-title":"FIRM-AFL: high-throughput greybox fuzzing of IoT firmware via augmented process emulation","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Zheng","year":"2019"},{"key":"ref24","first-page":"1237","article-title":"P2IM: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Feng","year":"2019"},{"key":"ref25","first-page":"1201","article-title":"HALucinator: Firmware re-hosting through abstraction layer emulation","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Clements","year":"2020"},{"key":"ref26","article-title":"TriforceAFL"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75496-1_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0165-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0291-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831730"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572303"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522922"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464842"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.67"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.11"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2016.7886675"},{"year":"2024","key":"ref39","article-title":"BLX instruction bug in QEMU"},{"year":"2024","key":"ref40","article-title":"STR instruction bug in QEMU"},{"year":"2024","key":"ref41","article-title":"Unaligned data access bug in QEMU"},{"year":"2024","key":"ref42","article-title":"WFI instruction bug in QEMU"},{"year":"2024","key":"ref43","article-title":"SIMD bug in QEMU system"},{"year":"2024","key":"ref44","article-title":"System register configuration bug in QEMU system"},{"year":"2024","key":"ref45","article-title":"LDC unimplementation in QEMU system"},{"year":"2024","key":"ref46","article-title":"Bugs in unicorn"},{"year":"2024","key":"ref47","article-title":"AttributeError bug in angr"},{"year":"2024","key":"ref48","article-title":"VABS bug in angr"},{"year":"2024","key":"ref49","article-title":"VMAX bug in angr"},{"year":"2024","key":"ref50","article-title":"VMUL bug in angr"},{"year":"2024","key":"ref51","article-title":"VCVT bug in angr"},{"year":"2024","key":"ref52","article-title":"Examiner"},{"key":"ref53","article-title":"ARM exploration tools"},{"key":"ref54","first-page":"29","article-title":"MARSS-x86: A QEMU-based micro-architectural and systems simulator for x86 multicore processors","volume-title":"Proc. 1st Int. QEMU Users\u2019 Forum","author":"Patel","year":"2011"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537690"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23145"},{"key":"ref57","first-page":"271","article-title":"Cardinal pill testing of system virtual machines","volume-title":"Proc. 23rd USENIX Secur. Symp. (USENIX Secur. 14)","author":"Shi","year":"2014"},{"year":"2024","key":"ref58","article-title":"Capstone"},{"year":"2024","key":"ref59","article-title":"Z3Prover"},{"year":"2024","key":"ref60","article-title":"ARM SIMD instructions"},{"year":"2024","key":"ref61","article-title":"ARM WFE instruction"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630086"},{"year":"2024","key":"ref63","article-title":"Panda.re"},{"year":"2024","key":"ref64","article-title":"Suterusu"},{"key":"ref65","first-page":"1913","article-title":"Fuzzification: Anti-fuzzing techniques","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Jung","year":"2019"},{"key":"ref66","first-page":"1931","article-title":"Antifuzz: Impeding fuzzing audits of binary executables","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"G\u00fcler","year":"2019"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3290384"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_1"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2004.1277900"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2015.10.012"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2002.1224444"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99336-8_7"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176425"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00103"},{"issue":"1","key":"ref75","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman","year":"1998","journal-title":"Digit. Tech. J."},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594334"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737986"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984038"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.14778\/3357377.3357382"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385985"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3428261"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115669"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9600-2"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10752626\/10555543.pdf?arnumber=10555543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:26:34Z","timestamp":1732667194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10555543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":83,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3406900","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}