{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:31:07Z","timestamp":1763343067747,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063592","type":"journal-article","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:58:28Z","timestamp":1743397108000},"page":"4939-4959","source":"Crossref","is-referenced-by-count":0,"title":["Sensitive Target-Guided Directed Fuzzing for IoT Web Services"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiongwei","family":"Cui","sequence":"first","affiliation":[]},{"given":"Yunchao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Wei","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Sinha S. Connected IoT devices forecast 2024-2030. 2024 [cited 2025 Jan 8]. Available from: https:\/\/iot-analytics.com\/number-connected-iot-devices\/."},{"key":"ref2","unstructured":"Internet of things statistics for 2025\u2014taking things apart 2023. [cited 2024 Feb 18]. Available from: https:\/\/dataprot.net\/statistics\/iot-statistics\/."},{"key":"ref3","series-title":"2020 IEEE Symposium on Security and Privacy (SP)","first-page":"1544","article-title":"Karonte: detecting insecure multi-binary interactions in embedded firmware","author":"Redini"},{"key":"ref4","series-title":"In: 30th USENIX Security Symposium","first-page":"303","article-title":"Sharing more and checking less: leveraging common input keywords to detect bugs in embedded systems","author":"Chen","year":"2021"},{"key":"ref5","series-title":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"360","article-title":"Detecting vulnerabilities in Linux-based embedded firmware with SSE-based on-demand alias analysis","author":"Cheng","year":"2023"},{"key":"ref6","series-title":"Proceedings 2024 Network and Distributed System Security Symposium","article-title":"Faster and better: detecting vulnerabilities in Linux-based iot firmware with optimized reaching definition analysis","author":"Gao","year":"2024"},{"key":"ref7","series-title":"33rd USENIX Conference on Security Symposium.","first-page":"7123","article-title":"Operation mango: scalable discovery of taint-style vulnerabilities in binary firmware services","author":"Gibbs","year":"2024"},{"key":"ref8","series-title":"In: 2023 IEEE Symposium on Security and Privacy (SP)","first-page":"3279","article-title":"Symbolic Query on Decompiled Code for Finding Bugs in COTS    Binaries","author":"Han","year":"2023"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"103157","DOI":"10.1016\/j.cose.2023.103157","article-title":"UCRF: static analyzing firmware to generate under-constrained seed for fuzzing SOHO router","volume":"128","author":"Qin","year":"2023","journal-title":"Comput Secur"},{"key":"ref10","series-title":"Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things","first-page":"15","article-title":"FirmFuzz: automated IoT firmware introspection and analysis","author":"Srivastava","year":"2019"},{"key":"ref11","series-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","first-page":"337","article-title":"Snipuzz: black-box fuzzing of IoT firmware via message snippet inference","author":"Feng","year":"2021"},{"key":"ref12","series-title":"Proceedings of the ACM Web Conference 2022","first-page":"524","article-title":"Game of hide-and-seek: exposing hidden interfaces in embedded web applications of IoT devices","author":"Xie","year":"2022"},{"key":"ref13","series-title":"Proceedings of the 28th USENIX Conference on Security Symposium","first-page":"1099","article-title":"FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation","author":"Zheng","year":"2019"},{"key":"ref14","series-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"417","article-title":"Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation","author":"Zheng","year":"2022"},{"key":"ref15","series-title":"Annual Computer Security Applications Conference","first-page":"733","article-title":"FirmAE: towards large-scale emulation of IoT firmware for dynamic analysis","author":"Kim","year":"2020"},{"key":"ref16","series-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security","first-page":"687","article-title":"SoK: enabling security analyses of embedded systems via rehosting","author":"Fasano","year":"2021"},{"key":"ref17","series-title":"Proceedings 2016 Network and Distributed System Security Symposium","article-title":"Towards automated dynamic analysis for Linux-based embedded firmware","author":"Chen","year":"2016"},{"key":"ref18","series-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","first-page":"5791","article-title":"Greenhouse: single-service rehosting of linux-based firmware binaries in user-space emulation","author":"Tay","year":"2023"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/s43621-024-00638-z","article-title":"Antenna systems for IoT applications: a review","volume":"5","author":"Khan","year":"2024","journal-title":"Discov Sustain"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"12699","DOI":"10.1109\/ACCESS.2024.3355312","article-title":"Machine learning solutions for the security of wireless sensor networks: a review","volume":"12","author":"Ghadi","year":"2024","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"e1840","DOI":"10.7717\/peerj-cs.1840","article-title":"Security risk models against attacks in smart grid using big data and artificial intelligence","volume":"10","author":"Yasin Ghadi","year":"2024","journal-title":"PeerJ Comput Sci"},{"key":"ref22","unstructured":"Joern\u2014The bug hunter\u2019s workbench. [cited 2024 May 23]. Available from: https:\/\/joern.io\/."},{"key":"ref23","series-title":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"1031","article-title":"Fuzzing embedded systems using debug interfaces","author":"Eisele","year":"2023"},{"key":"ref24","series-title":"2024 IEEE Symposium on Security and Privacy (SP)","first-page":"881","article-title":"LLMIF: augmented large language model for fuzzing IoT devices","author":"Wang","year":"2024"},{"key":"ref25","series-title":"Proceedings 2024 Network and Distributed System Security Symposium","article-title":"Large language model guided protocol fuzzing","author":"Meng","year":"2024"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63592\/TSP_CMC_63592.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:31Z","timestamp":1763342971000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063592","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}