{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:22Z","timestamp":1773615922844,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700804","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:50Z","timestamp":1771936490000},"page":"1278-1284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzz Testing of Closed-Source Software Using Large Language Models"],"prefix":"10.3103","volume":"59","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Gavrichkov","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7915_CR1","doi-asserted-by":"publisher","unstructured":"Panamarev, G.E., Katkov, A.V., Kornakov, A.P., and Lugovskiy, S.V., Methods for improving the efficiency of fuzzing testing of operating systems, Izvestiya Tul\u2019skogo Gosudarstvennogo Universiteta. Tekhnicheskie Nauki, 2024, no. 7, pp. 294\u2013297. https:\/\/doi.org\/10.24412\/2071-6168-2024-7-294-295","DOI":"10.24412\/2071-6168-2024-7-294-295"},{"key":"7915_CR2","doi-asserted-by":"publisher","unstructured":"Ding, Zh.Yu. and Le Goues, C., An empirical study of OSS-Fuzz bugs, 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR), Madrid, 2021, IEEE, 2021, pp. 131\u2013142. https:\/\/doi.org\/10.1109\/msr52588.2021.00026","DOI":"10.1109\/msr52588.2021.00026"},{"key":"7915_CR3","unstructured":"Fioraldi, A. et al., AFL++: Combining incremental steps of fuzzing research, 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020."},{"key":"7915_CR4","unstructured":"Raulin, V. et al., GUI-Mimic, a cross-platform recorder and fuzzer of Graphical User Interface, GreHack 2021-9th International Symposium on Research in Grey-Hat Hacking, 2021, pp. 1\u20137."},{"key":"7915_CR5","doi-asserted-by":"publisher","first-page":"826","DOI":"10.3103\/s0146411615080325","volume":"49","author":"A.I. Pechenkin","year":"2015","unstructured":"Pechenkin, A.I. and Lavrova, D.S., Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 826\u2013833. https:\/\/doi.org\/10.3103\/s0146411615080325","journal-title":"Autom. Control Comput. Sci."},{"key":"7915_CR6","first-page":"239","volume":"10","author":"S. Gorbunov","year":"2010","unstructured":"Gorbunov, S. and Rosenbloom, A., Autofuzz: Automated network protocol fuzzing framework, International Journal of Computer Science and Network Security, 2010, vol. 10, no. 8, p. 239.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"7915_CR7","unstructured":"Testing graphical user interfaces. https:\/\/www.fuzzingbook.org\/html\/GUIFuzzer.html. Cited April 21, 2025."},{"key":"7915_CR8","unstructured":"Multilingual MMLU benchmark leaderboard, 2025. https:\/\/huggingface.co\/spaces\/StarscreamDeceptions\/Multilingual-MMLU-Benchmark-Leaderboard. Cited April 23, 2025."},{"key":"7915_CR9","doi-asserted-by":"publisher","unstructured":"Suprun, A., Tatarnikova, T., Sikarev, I., and Shmeleva, A., Detection of malicious program for the Android platform by deep training, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 31\u201338. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_3","DOI":"10.1007\/978-3-030-93872-7_3"},{"key":"7915_CR10","doi-asserted-by":"publisher","unstructured":"Shi, F., Suzgun, M., Freitag, M., Wang, X., Srivats, S., Vosoughi, S., Chung, H.W., Tay, Yi., Ruder, S., Zhou, D., Das, D., and Wei, J., Language models are multilingual chain-of-thought reasoners, arXiv Preprint, 2022. https:\/\/doi.org\/10.48550\/arXiv.2210.03057","DOI":"10.48550\/arXiv.2210.03057"},{"key":"7915_CR11","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1016\/j.procs.2022.01.135","volume":"199","author":"P. Jiang","year":"2022","unstructured":"Jiang, P., Ergu, D., Liu, F., Cai, Yi., and Ma, B., A review of YOLO algorithm developments, Procedia Computer Science, 2022, vol. 199, pp. 1066\u20131073. https:\/\/doi.org\/10.1016\/j.procs.2022.01.135","journal-title":"Procedia Computer Science"},{"key":"7915_CR12","doi-asserted-by":"publisher","unstructured":"Xie, M., Feng, S., Xing, Zh., Chen, J., and Chen, Ch., UIED: A hybrid tool for GUI element detection, Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, New York: Association for Computing Machinery, 2020, pp. 1655\u20131659. https:\/\/doi.org\/10.1145\/3368089.3417940","DOI":"10.1145\/3368089.3417940"},{"key":"7915_CR13","doi-asserted-by":"publisher","first-page":"793","DOI":"10.3103\/s0146411620080258","volume":"54","author":"E.Yu. Pavlenko","year":"2020","unstructured":"Pavlenko, E.Yu. and Kudinov, K.V., Ensuring cyber resilience of large-scale network infrastructure using the ant algorithm, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 793\u2013802. https:\/\/doi.org\/10.3103\/s0146411620080258","journal-title":"Autom. Control Comput. Sci."},{"key":"7915_CR14","unstructured":"UI Automation. https:\/\/learn.microsoft.com\/en-us\/dotnet\/framework\/ui-automation\/ui-automation-overview. Cited April 7, 2025."},{"key":"7915_CR15","doi-asserted-by":"publisher","unstructured":"Meng, R., Mirchev, M., B\u00f6hme, M., and Roychoudhury, A., Large language model guided protocol fuzzing, Proceedings 2024 Network and Distributed System Security Symposium, San Diego, CA, 2024, Internet Society, 2024. https:\/\/doi.org\/10.14722\/ndss.2024.24556","DOI":"10.14722\/ndss.2024.24556"},{"key":"7915_CR16","doi-asserted-by":"publisher","first-page":"684","DOI":"10.3103\/s0146411615080301","volume":"49","author":"D. Moskvin","year":"2015","unstructured":"Moskvin, D., Zegzhda, D., and Nikolskiy, A., Secure processor architecture modeling for large-scale systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 684\u2013689. https:\/\/doi.org\/10.3103\/s0146411615080301","journal-title":"Autom. Control Comput. Sci."},{"key":"7915_CR17","unstructured":"Frida. https:\/\/frida.re\/docs\/home. Cited April 21, 2025."},{"key":"7915_CR18","doi-asserted-by":"publisher","unstructured":"Smith, R., An overview of the Tesseract OCR engine, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), Curitiba, Brazil, 2007, IEEE, 2007, vol. 2, pp. 629\u2013633. https:\/\/doi.org\/10.1109\/icdar.2007.4376991","DOI":"10.1109\/icdar.2007.4376991"},{"key":"7915_CR19","unstructured":"IDA Pro. https:\/\/hex-rays.com\/ida-pro\/. Cited April 13, 2025."},{"key":"7915_CR20","unstructured":"Lighthouse\u2014A coverage explorer for reverse engineers. https:\/\/github.com\/gaasedelen\/lighthouse\/. Cited April 13, 2025."},{"key":"7915_CR21","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3103\/s0146411620080246","volume":"54","author":"T.D. Ovasapyan","year":"2020","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Application of taint analysis to study the safety of software of the Internet of Things devices based on the ARM architecture, Autom. Control Comput. Sci., 2020, vol. 54, no.\u00a08, pp. 834\u2013840. https:\/\/doi.org\/10.3103\/s0146411620080246","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700804.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700804","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700804.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:14Z","timestamp":1773612434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7915"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700804","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"17 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}