{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:06Z","timestamp":1750220766439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T00:00:00Z","timestamp":1592265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["U183620961802394"],"award-info":[{"award-number":["U183620961802394"]}]},{"name":"National Key Research and Development Program of China","award":["2016QY071405"],"award-info":[{"award-number":["2016QY071405"]}]},{"name":"Strategic Priority Research Program of CAS","award":["XDC02040100"],"award-info":[{"award-number":["XDC02040100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,16]]},"DOI":"10.1145\/3372799.3394363","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T15:04:12Z","timestamp":1590764652000},"page":"74-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting the Trust Between Boundaries"],"prefix":"10.1145","author":[{"given":"Xiaoyu","family":"He","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Erick","family":"Bauman","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lei","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Linyu","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Bingchang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Aihua","family":"Piao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Dallas, TX, USA"}]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,6,16]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Sark documentation. https:\/\/sark.readthedocs.io\/en\/latest","author":"Bahar Tamir","year":"2015","unstructured":"Tamir Bahar . Sark documentation. https:\/\/sark.readthedocs.io\/en\/latest , 2015 . Tamir Bahar. Sark documentation. https:\/\/sark.readthedocs.io\/en\/latest, 2015."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"volume-title":"May","year":"2013","key":"e_1_3_2_2_4_1","unstructured":"Cisco. HP printers remote unauthorized file access information disclosure vulnerability. https:\/\/tools.cisco.com\/security\/center\/viewAlert.x?alertId=29111 , May 2013 . Cisco. HP printers remote unauthorized file access information disclosure vulnerability. https:\/\/tools.cisco.com\/security\/center\/viewAlert.x?alertId=29111, May 2013."},{"key":"e_1_3_2_2_5_1","volume-title":"Hacking printers: For fun and profit. Hack.lu Security Conference","author":"Costin Andrei","year":"2010","unstructured":"Andrei Costin . Hacking printers: For fun and profit. Hack.lu Security Conference , 2010 . http:\/\/archive.hack.lu\/2010\/Costin-HackingPrintersForFunAndProfit-slides.pdf. Andrei Costin. Hacking printers: For fun and profit. Hack.lu Security Conference, 2010. http:\/\/archive.hack.lu\/2010\/Costin-HackingPrintersForFunAndProfit-slides.pdf."},{"key":"e_1_3_2_2_6_1","volume-title":"Chaos Communication Congress nymCCC, 2011","author":"Costin Andrei","year":"2011","unstructured":"Andrei Costin . Hacking MFPs. cnum28th Chaos Communication Congress nymCCC, 2011 . https:\/\/fahrplan.events.ccc.de\/congress\/ 2011 \/Fahrplan\/track\/Hacking\/4871.en.html. Andrei Costin. Hacking MFPs. cnum28th Chaos Communication Congress nymCCC, 2011. https:\/\/fahrplan.events.ccc.de\/congress\/2011\/Fahrplan\/track\/Hacking\/4871.en.html."},{"key":"e_1_3_2_2_7_1","volume-title":"PostScript: Danger ahead?! HITB Security Conference","author":"Costin Andrei","year":"2012","unstructured":"Andrei Costin . PostScript: Danger ahead?! HITB Security Conference , 2012 . https:\/\/www.slideshare.net\/phdays\/postscript-danger-ahead. Andrei Costin. PostScript: Danger ahead?! HITB Security Conference, 2012. https:\/\/www.slideshare.net\/phdays\/postscript-danger-ahead."},{"key":"e_1_3_2_2_8_1","unstructured":"Andrei Costin. Andrei Costin papers. http:\/\/andreicostin.com\/papers 2016.  Andrei Costin. Andrei Costin papers. http:\/\/andreicostin.com\/papers 2016."},{"key":"e_1_3_2_2_9_1","first-page":"463","volume-title":"Proceedings of the cnum22nd USENIX Security Symposium","author":"Davidson Drew","year":"2013","unstructured":"Drew Davidson , Benjamin Moench , Thomas Ristenpart , and Somesh Jha . FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution . In Proceedings of the cnum22nd USENIX Security Symposium , pages 463 -- 478 , 2013 . Drew Davidson, Benjamin Moench, Thomas Ristenpart, and Somesh Jha. FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution. In Proceedings of the cnum22nd USENIX Security Symposium, pages 463--478, 2013."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_2_11_1","volume-title":"Someone hacked printers worldwide, urging people to subscribe to PewDiePie","author":"Hernandez Patricia","year":"2018","unstructured":"Patricia Hernandez . Someone hacked printers worldwide, urging people to subscribe to PewDiePie . November 2018 . https:\/\/www.theverge.com\/2018\/11\/30\/18119576\/pewdiepie-printer-hack-t-series-youtube. Patricia Hernandez. Someone hacked printers worldwide, urging people to subscribe to PewDiePie. November 2018. https:\/\/www.theverge.com\/2018\/11\/30\/18119576\/pewdiepie-printer-hack-t-series-youtube."},{"key":"e_1_3_2_2_12_1","volume-title":"Manuel Egele, Edward J. Schwartz, and Maverick Woo. The art, science, and engineering of fuzzing: A survey","author":"Marie Man\u00e8s Valentin Jean","year":"2019","unstructured":"Valentin Jean Marie Man\u00e8s , HyungSeok Han , Choongwoo Han , Sang Kil Cha , Manuel Egele, Edward J. Schwartz, and Maverick Woo. The art, science, and engineering of fuzzing: A survey . IEEE Transactions on Software Engineering nymTSE, 2019 . Valentin Jean Marie Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, and Maverick Woo. The art, science, and engineering of fuzzing: A survey. IEEE Transactions on Software Engineering nymTSE, 2019."},{"volume-title":"Bidirectional communication error codes","year":"2017","key":"e_1_3_2_2_13_1","unstructured":"Microsoft. Bidirectional communication error codes , 2017 . https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/print\/bidi-error-codes. Microsoft. Bidirectional communication error codes, 2017. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/print\/bidi-error-codes."},{"volume-title":"Bidirectional communication schema reference. https:\/\/docs.microsoft.com\/windows-hardware\/drivers\/print\/bidi-communications-schema-reference","year":"2017","key":"e_1_3_2_2_14_1","unstructured":"Microsoft. Bidirectional communication schema reference. https:\/\/docs.microsoft.com\/windows-hardware\/drivers\/print\/bidi-communications-schema-reference , 2017 . Microsoft. Bidirectional communication schema reference. https:\/\/docs.microsoft.com\/windows-hardware\/drivers\/print\/bidi-communications-schema-reference, 2017."},{"volume-title":"Introduction to rendering plug-ins","year":"2017","key":"e_1_3_2_2_15_1","unstructured":"Microsoft. Introduction to rendering plug-ins , 2017 . https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/print\/introduction-to-rendering-plug-ins. Microsoft. Introduction to rendering plug-ins, 2017. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/print\/introduction-to-rendering-plug-ins."},{"key":"e_1_3_2_2_16_1","first-page":"213","volume-title":"Proceedings of the cnum38th IEEE Symposium on Security & Privacy nymS&P","author":"M\u00fcller Jens","year":"2017","unstructured":"Jens M\u00fcller , Vladislav Mladenov , Juraj Somorovsky , and J\u00f6rg Schwenk . Sok : Exploiting network printers . In Proceedings of the cnum38th IEEE Symposium on Security & Privacy nymS&P , pages 213 -- 230 , 2017 . Jens M\u00fcller, Vladislav Mladenov, Juraj Somorovsky, and J\u00f6rg Schwenk. Sok: Exploiting network printers. In Proceedings of the cnum38th IEEE Symposium on Security & Privacy nymS&P, pages 213--230, 2017."},{"key":"e_1_3_2_2_17_1","volume-title":"October","author":"Europe OKI","year":"2019","unstructured":"OKI Europe . What is port 9100? https:\/\/okiprinting-en-gb.custhelp.com\/app\/answers\/detail\/a_id\/334\/ \/what-is-port-9100%3F , October 2019 . OKI Europe. What is port 9100? https:\/\/okiprinting-en-gb.custhelp.com\/app\/answers\/detail\/a_id\/334\/ \/what-is-port-9100%3F, October 2019."},{"volume-title":"Frida -- a world-class dynamic instrumentation framework. https:\/\/www.frida.re","year":"2019","key":"e_1_3_2_2_18_1","unstructured":"oleavr. Frida -- a world-class dynamic instrumentation framework. https:\/\/www.frida.re , 2019 . oleavr. Frida -- a world-class dynamic instrumentation framework. https:\/\/www.frida.re, 2019."},{"key":"e_1_3_2_2_19_1","volume-title":"sulley: A pure-Python fully automated and unattended fuzzing framework. https:\/\/github.com\/OpenRCE\/sulley","author":"RCE.","year":"2019","unstructured":"Open RCE. sulley: A pure-Python fully automated and unattended fuzzing framework. https:\/\/github.com\/OpenRCE\/sulley , 2019 . OpenRCE. sulley: A pure-Python fully automated and unattended fuzzing framework. https:\/\/github.com\/OpenRCE\/sulley, 2019."},{"key":"e_1_3_2_2_20_1","volume-title":"Peach fuzzer: Discover unknown vulnerabilities. https:\/\/www.peach.tech","author":"Tech Peach","year":"2020","unstructured":"Peach Tech . Peach fuzzer: Discover unknown vulnerabilities. https:\/\/www.peach.tech , 2020 . Peach Tech. Peach fuzzer: Discover unknown vulnerabilities. https:\/\/www.peach.tech, 2020."},{"key":"e_1_3_2_2_21_1","first-page":"697","volume-title":"Proceedings of the cnum39th IEEE Symposium on Security & Privacy nymS&P","author":"Peng Hui","year":"2018","unstructured":"Hui Peng , Yan Shoshitaishvili , and Mathias Payer . T-Fuzz : Fuzzing by program transformation . In Proceedings of the cnum39th IEEE Symposium on Security & Privacy nymS&P , pages 697 -- 710 , 2018 . Hui Peng, Yan Shoshitaishvili, and Mathias Payer. T-Fuzz: Fuzzing by program transformation. In Proceedings of the cnum39th IEEE Symposium on Security & Privacy nymS&P, pages 697--710, 2018."},{"key":"e_1_3_2_2_22_1","volume-title":"Ruxcon Security Conference, 2017","author":"Min Zheng Redrain","year":"2017","unstructured":"Redrain and Min Zheng . A ghost from PostScript . Ruxcon Security Conference, 2017 . https:\/\/ruxcon.org.au\/assets\/ 2017 \/slides\/hong-ps-and-gs-ruxcon2017.pdf. Redrain and Min Zheng. A ghost from PostScript. Ruxcon Security Conference, 2017. https:\/\/ruxcon.org.au\/assets\/2017\/slides\/hong-ps-and-gs-ruxcon2017.pdf."},{"key":"e_1_3_2_2_23_1","unstructured":"Ricoh. Spool printing. http:\/\/support.ricoh.com\/bb_v1oi\/pub_e\/oi_view\/0001038\/0001038577\/view\/software\/unv\/0065.htm 2009.  Ricoh. Spool printing. http:\/\/support.ricoh.com\/bb_v1oi\/pub_e\/oi_view\/0001038\/0001038577\/view\/software\/unv\/0065.htm 2009."},{"volume-title":"fuzzywuzzy: Fuzzy string matching in Python. https:\/\/github.com\/seatgeek\/fuzzywuzzy","year":"2020","key":"e_1_3_2_2_24_1","unstructured":"SeatGeek. fuzzywuzzy: Fuzzy string matching in Python. https:\/\/github.com\/seatgeek\/fuzzywuzzy , 2020 . SeatGeek. fuzzywuzzy: Fuzzy string matching in Python. https:\/\/github.com\/seatgeek\/fuzzywuzzy, 2020."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the cnum19th National Information Systems Security Conference","author":"Sibert W. Olin","year":"1996","unstructured":"W. Olin Sibert . Malicious data and computer security . In Proceedings of the cnum19th National Information Systems Security Conference , 1996 . W. Olin Sibert. Malicious data and computer security. In Proceedings of the cnum19th National Information Systems Security Conference, 1996."},{"volume-title":"Printer share by vendor worldwide from 2015 to","year":"2019","key":"e_1_3_2_2_28_1","unstructured":"Statista. Printer share by vendor worldwide from 2015 to 2019 . https:\/\/www.statista.com\/statistics\/541347\/worldwide-printer-market-vendor-shares. Statista. Printer share by vendor worldwide from 2015 to 2019. https:\/\/www.statista.com\/statistics\/541347\/worldwide-printer-market-vendor-shares."},{"key":"e_1_3_2_2_29_1","volume-title":"The Register","author":"Thomson Iain","year":"2017","unstructured":"Iain Thomson . Hacker : I made 160,000 printers spew out ASCII art around the world . The Register , February 2017 . https:\/\/www.theregister.co.uk\/2017\/02\/06\/hacker_160000_printers. Iain Thomson. Hacker: I made 160,000 printers spew out ASCII art around the world. The Register, February 2017. https:\/\/www.theregister.co.uk\/2017\/02\/06\/hacker_160000_printers."},{"key":"e_1_3_2_2_30_1","unstructured":"Undocumented Printing Wiki. Page description languages [undocumented printing]. http:\/\/www.undocprint.org\/formats\/page_description_languages.  Undocumented Printing Wiki. Page description languages [undocumented printing]. http:\/\/www.undocprint.org\/formats\/page_description_languages."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_2_32_1","unstructured":"Wikipedia. Page description language. https:\/\/en.wikipedia.org\/wiki\/Page_description_language.  Wikipedia. Page description language. https:\/\/en.wikipedia.org\/wiki\/Page_description_language."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"volume-title":"Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API. https:\/\/github.com\/zardus\/idalink","year":"2018","key":"e_1_3_2_2_34_1","unstructured":"zardus. Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API. https:\/\/github.com\/zardus\/idalink , 2018 . zardus. Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API. https:\/\/github.com\/zardus\/idalink, 2018."}],"event":{"name":"LCTES '20: 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"London United Kingdom","acronym":"LCTES '20"},"container-title":["The 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394363","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372799.3394363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394363"}},"subtitle":["Discovering Memory Corruptions in Printers via Driver-Assisted Testing"],"short-title":[],"issued":{"date-parts":[[2020,6,16]]},"references-count":34,"alternative-id":["10.1145\/3372799.3394363","10.1145\/3372799"],"URL":"https:\/\/doi.org\/10.1145\/3372799.3394363","relation":{},"subject":[],"published":{"date-parts":[[2020,6,16]]},"assertion":[{"value":"2020-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}