{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:45:18Z","timestamp":1773330318695,"version":"3.50.1"},"reference-count":58,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["CNS-2019340"],"award-info":[{"award-number":["CNS-2019340"]}]},{"name":"National Science Foundation","award":["ECCS-2140175"],"award-info":[{"award-number":["ECCS-2140175"]}]},{"name":"National Science Foundation","award":["RC-40125b-2023"],"award-info":[{"award-number":["RC-40125b-2023"]}]},{"name":"National Science Foundation","award":["62202188"],"award-info":[{"award-number":["62202188"]}]},{"DOI":"10.13039\/100017865","name":"Department of Energy Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER)","doi-asserted-by":"publisher","award":["CNS-2019340"],"award-info":[{"award-number":["CNS-2019340"]}],"id":[{"id":"10.13039\/100017865","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017865","name":"Department of Energy Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER)","doi-asserted-by":"publisher","award":["ECCS-2140175"],"award-info":[{"award-number":["ECCS-2140175"]}],"id":[{"id":"10.13039\/100017865","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017865","name":"Department of Energy Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER)","doi-asserted-by":"publisher","award":["RC-40125b-2023"],"award-info":[{"award-number":["RC-40125b-2023"]}],"id":[{"id":"10.13039\/100017865","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017865","name":"Department of Energy Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER)","doi-asserted-by":"publisher","award":["62202188"],"award-info":[{"award-number":["62202188"]}],"id":[{"id":"10.13039\/100017865","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["CNS-2019340"],"award-info":[{"award-number":["CNS-2019340"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ECCS-2140175"],"award-info":[{"award-number":["ECCS-2140175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["RC-40125b-2023"],"award-info":[{"award-number":["RC-40125b-2023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202188"],"award-info":[{"award-number":["62202188"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>As IoT devices with microcontroller (MCU)-based firmware become more common in our lives, memory corruption vulnerabilities in their firmware are increasingly targeted by adversaries. Fuzzing is a powerful method for detecting these vulnerabilities, but it poses unique challenges when applied to IoT devices. Direct fuzzing on these devices is inefficient, and recent efforts have shifted towards creating emulation environments for dynamic firmware testing. However, unlike traditional software, firmware interactions with peripherals that are significantly more diverse presents new challenges for achieving scalable full-system emulation and effective fuzzing. This paper reviews 27 state-of-the-art works in MCU-based firmware emulation and its applications in fuzzing. Instead of classifying existing techniques based on their capabilities and features, we first identify the fundamental challenges faced by firmware emulation and fuzzing. We then revisit recent studies, organizing them according to the specific challenges they address, and discussing how each specific challenge is addressed. We compare the emulation fidelity and bug detection capabilities of various techniques to clearly demonstrate their strengths and weaknesses, aiding users in selecting or combining tools to meet their needs. Finally, we highlight the remaining technical gaps and point out important future research directions in firmware emulation and fuzzing.<\/jats:p>","DOI":"10.3390\/fi17010019","type":"journal-article","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T06:43:04Z","timestamp":1736145784000},"page":"19","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7834-0839","authenticated-orcid":false,"given":"Wei","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6483-5485","authenticated-orcid":false,"given":"Shandian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,6]]},"reference":[{"key":"ref_1","unstructured":"Foundation, E. (2024, December 21). IoT and Embedded Survey Report 2024. Available online: https:\/\/outreach.eclipse.foundation\/iot-embedded-developer-survey-2024."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Wetzels, J., Holz, T., and Etalle, S. (2019, January 17\u201319). Challenges in designing exploit mitigations for deeply embedded systems. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhou, W., Jiang, Z., and Guan, L. (2023, January 3). Understanding MPU Usage in Microcontroller-based Systems in the Wild. Proceedings of the Workshop on Binary Analysis Research (BAR) 2023, San Diego, CA, USA.","DOI":"10.14722\/bar.2023.23007"},{"key":"ref_4","unstructured":"NSFoCus (2024, November 19). Insight RSA 2023: Botnet Threat Situation Observation. Available online: http:\/\/blog.nsfocus.net\/rsa-2023insight2\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/3363824","article-title":"Fuzzing: Hack, art, and science","volume":"63","author":"Godefroid","year":"2020","journal-title":"Commun. ACM"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Fasano, A., Ballo, T., Muench, M., Leek, T., Bulekov, A., Dolan-Gavitt, B., Egele, M., Francillon, A., Lu, L., and Gregory, N. (2021, January 7\u201311). Sok: Enabling security analyses of embedded systems via rehosting. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (CCS), Online, Hong Kong.","DOI":"10.1145\/3433210.3453093"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3423167","article-title":"Challenges in firmware re-hosting, emulation, and analysis","volume":"54","author":"Wright","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/JAS.2022.105860","article-title":"Detecting vulnerability on IoT device firmware: A survey","volume":"10","author":"Feng","year":"2022","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_9","unstructured":"FreeRTOS (2024, December 21). FreeRTOS LTS libraries. Available online: https:\/\/www.freertos.org\/Documentation\/03-Libraries\/01-Library-overview\/03-LTS-libraries\/01-LTS-libraries."},{"key":"ref_10","unstructured":"RT-Thread (2024, December 21). RT-Thread Packages. Available online: https:\/\/packages.rt-thread.org\/."},{"key":"ref_11","unstructured":"STMicroelectronics (2024, December 21). STM32Cube Initialization Code Generator. Available online: https:\/\/www.st.com\/en\/development-tools\/stm32cubemx.html."},{"key":"ref_12","unstructured":"Bellard, F. (2005, January 10\u201315). QEMU, a fast and portable dynamic translator. Proceedings of the USENIX Annual Technical Conference, FREENIX Track, Anaheim, CA, USA."},{"key":"ref_13","unstructured":"Quynh, N.A., and Vu, D.H. (2024, December 21). Unicorn: Next Generation CPU Emulator Framework. Available online: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Nguyen-Unicorn-Next-Generation-CPU-Emulator-Framework.pdf."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Muench, M., Nisi, D., Francillon, A., and Balzarotti, D. (2018, January 18). Avatar 2: A multi-target orchestration platform. Proceedings of the Workshop on Binary Analysis Research (BAR) 2018, San Diego, CA, USA.","DOI":"10.14722\/bar.2018.23017"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Karg\u00e9n, U., and Shahmehri, N. (2018, January 27\u201330). Speeding up bug finding using focused fuzzing. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES) 2018, Hamburg, Germany.","DOI":"10.1145\/3230833.3230867"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Muench, M., Stijohann, J., Kargl, F., Francillon, A., and Balzarotti, D. (2018, January 18\u201321). What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS) 2018, San Diego, CA, USA.","DOI":"10.14722\/ndss.2018.23166"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/2.982916","article-title":"Simics: A full system simulation platform","volume":"35","author":"Magnusson","year":"2002","journal-title":"Computer"},{"key":"ref_18","unstructured":"Agency, N.S. (2024, November 19). NSA\u2019s Research Directorat Ghidra. Available online: https:\/\/ghidra-sre.org\/."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chen, Z., Thomas, S.L., and Garcia, F.D. (2022, January 7\u201311). Metaemu: An architecture agnostic rehosting framework for automotive firmware. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3559338"},{"key":"ref_20","unstructured":"Seidel, L., Maier, D.C., and Muench, M. (2023, January 9\u201311). Forming Faster Firmware Fuzzers. Proceedings of the 32nd USENIX Security Symposium, Anaheim, CA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chen, D.D., Woo, M., Brumley, D., and Egele, M. (2016, January 21\u201324). Towards automated dynamic analysis for linux-based embedded firmware. Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS) 2016, San Diego, CA, USA.","DOI":"10.14722\/ndss.2016.23415"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kim, M., Kim, D., Kim, E., Kim, S., Jang, Y., and Kim, Y. (2020, January 7\u201311). Firmae: Towards large-scale emulation of iot firmware for dynamic analysis. Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC) 2020, Online\/Austin, TX, USA.","DOI":"10.1145\/3427228.3427294"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Jiang, M., Ma, L., Zhou, Y., Liu, Q., Zhang, C., Wang, Z., Luo, X., Wu, L., and Ren, K. (2021, January 15\u201319). ECMO: Peripheral transplantation to Rehost embedded Linux kernels. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), Online, Republic of Korea.","DOI":"10.1145\/3460120.3484753"},{"key":"ref_24","unstructured":"Clements, A.A., Gustafson, E., Scharnowski, T., Grosen, P., Fritz, D., Kruegel, C., Vigna, G., Bagchi, S., and Payer, M. (2020, January 12\u201314). HALucinator: Firmware re-hosting through abstraction layer emulation. Proceedings of the 29th USENIX Security Symposium, Online."},{"key":"ref_25","unstructured":"Gustafson, E., Muench, M., Spensky, C., Redini, N., Machiry, A., Fratantonio, Y., Balzarotti, D., Francillon, A., Choe, Y.R., and Kruegel, C. (2019, January 23\u201325). Toward the analysis of embedded firmware through automated re-hosting. Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019, Chaoyang District, Beijing, China."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Spensky, C., Machiry, A., Redini, N., Unger, C., Foster, G., Blasband, E., Okhravi, H., Kruegel, C., and Vigna, G. (2021, January 7\u201311). Conware: Automated modeling of hardware peripherals. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (AsiaCCS), Online, Hong Kong.","DOI":"10.1145\/3433210.3437532"},{"key":"ref_27","unstructured":"Feng, B., Mera, A., and Lu, L. (2020, January 12\u201314). P2IM: Scalable and hardware-independent firmware testing via automatic peripheral interface modeling. Proceedings of the 29th USENIX Security Symposium, Online."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mera, A., Feng, B., Lu, L., and Kirda, E. (2021, January 24\u201327). DICE: Automatic emulation of DMA input channels for dynamic firmware analysis. Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40001.2021.00018"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Hernandez, G., Muench, M., Maier, D., Milburn, A., Park, S., Scharnowski, T., Tucker, T., Traynor, P., and Butler, K. (2022, January 24\u201328). FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware. Proceedings of the Network and Distributed Systems Security Symposium (NDSS) 2022, San Diego, CA, USA.","DOI":"10.14722\/ndss.2022.23136"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Cao, C., Guan, L., Ming, J., and Liu, P. (2020, January 7\u201311). Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation. Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC) 2020, Austin, TA, USA.","DOI":"10.1145\/3427228.3427280"},{"key":"ref_31","unstructured":"Zhou, W., Guan, L., Liu, P., and Zhang, Y. (2021, January 11\u201313). Automatic firmware emulation through invalidity-guided knowledge inference. Proceedings of the 30th USENIX Security Symposium, Online."},{"key":"ref_32","unstructured":"Johnson, E., Bland, M., Zhu, Y., Mason, J., Checkoway, S., Savage, S., and Levchenko, K. (2021, January 11\u201313). Jetset: Targeted firmware rehosting for embedded systems. Proceedings of the 30th USENIX Security Symposium, Online."},{"key":"ref_33","unstructured":"Scharnowski, T., Bars, N., Schloegel, M., Gustafson, E., Muench, M., Vigna, G., Kruegel, C., Holz, T., and Abbasi, A. (2022, January 10\u201312). Fuzzware: Using precise MMIO modeling for effective firmware fuzzing. Proceedings of the 31st USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Farrelly, G., Chesser, M., and Ranasinghe, D.C. (2023, January 10\u201314). Ember-IO: Effective firmware fuzzing with model-free memory mapped IO. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (AsiaCCS), Melbourne, VIC, Australia.","DOI":"10.1145\/3579856.3582840"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhang, L., Guan, L., Liu, P., and Zhang, Y. (2022, January 7\u201311). What your firmware tells you is not how you should emulate it: A specification-guided approach for firmware emulation. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3559386"},{"key":"ref_36","unstructured":"Lei, C., Ling, Z., Zhang, Y., Yang, Y., Luo, J., and Fu, X. (2024, January 14\u201316). A Friend\u2019s Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gritti, F., Pagani, F., Grishchenko, I., Dresel, L., Redini, N., Kruegel, C., and Vigna, G. (2022, January 22\u201326). Heapster: Analyzing the security of dynamic allocators for monolithic firmware images. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46214.2022.9833610"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Yao, Y., Zhou, W., Jia, Y., Zhu, L., Liu, P., and Zhang, Y. (2019, January 23\u201327). Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution. Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS) 2019, Luxembourg.","DOI":"10.1007\/978-3-030-29959-0_31"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Chen, L., Cai, Q., Ma, Z., Wang, Y., Hu, H., Shen, M., Liu, Y., Guo, S., Duan, H., and Jiang, K. (2022, January 7\u201311). Sfuzz: Slice-based fuzzing for real-time operating systems. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3559367"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zaddach, J., Bruno, L., Francillon, A., and Balzarotti, D. (2014, January 23\u201326). AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems\u2019 Firmwares. Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS) 2014, San Diego, CA, USA.","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Won, J.Y., Wen, H., and Lin, Z. (2022, January 26\u201328). What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2022, Limassol, Cyprus.","DOI":"10.1145\/3545948.3545957"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1109\/TDSC.2023.3339569","article-title":"AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis","volume":"21","author":"Feng","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_43","unstructured":"Farrelly, G., Quirk, P., Kanhere, S.S., Camtepe, S., and Ranasinghe, D.C. (2023, January 25\u201329). SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing. Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS) 2023, The Hague, The Netherlands."},{"key":"ref_44","unstructured":"Scharnowski, T., W\u00f6rner, S., Buchmann, F., Bars, N., Schloegel, M., and Holz, T. (2023, January 9\u201311). Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs. Proceedings of the 32nd USENIX Security Symposium, Anaheim, CA, USA."},{"key":"ref_45","unstructured":"Chesser, M., Nepal, S., and Ranasinghe, D.C. (2024, January 14\u201316). MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware. Proceedings of the 33rd USENIX Security Symposium, Philadelphia, PA, USA."},{"key":"ref_46","unstructured":"Salehi, M., Hughes, D., and Crispo, B. (2020, January 14\u201315). \u03bcSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability. Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2020, San Sebastian, Spain."},{"key":"ref_47","unstructured":"Zalewski, M. (2024, December 21). American Fuzzy Lop. Available online: http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"ref_48","unstructured":"Fioraldi, A., Maier, D., Ei\u00dffeldt, H., and Heuse, M. (2020, January 11). AFL++: Combining Incremental Steps of Fuzzing Research. Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT) 2020, Online."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Fioraldi, A., Maier, D.C., Zhang, D., and Balzarotti, D. (2022, January 7\u201311). Libafl: A framework to build modular and reusable fuzzers. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560602"},{"key":"ref_50","unstructured":"LLVM (2024, November 19). libFuzzer\u2014A Library for Coverage-Guided Fuzz Testing. Available online: https:\/\/llvm.org\/docs\/LibFuzzer.html."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wen, H., Lin, Z., and Zhang, Y. (2020, January 9\u201313). Firmxray: Detecting bluetooth link layer vulnerabilities from bare-metal firmware. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), Online, USA.","DOI":"10.1145\/3372297.3423344"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"120495","DOI":"10.1016\/j.eswa.2023.120495","article-title":"Reinforcement learning algorithms: A brief survey","volume":"231","author":"Shakya","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref_53","unstructured":"Baktash, J.A., and Dawodi, M. (2023). Gpt-4: A review on advancements and opportunities in natural language processing. arXiv."},{"key":"ref_54","unstructured":"Yun, I., Lee, S., Xu, M., Jang, Y., and Kim, T. (2018, January 15\u201317). QSYM: A practical concolic execution engine tailored for hybrid fuzzing. Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, USA."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Nguyen, M.D., and Roychoudhury, A. (November, January 30). Directed greybox fuzzing. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), Dallas, Texas, USA.","DOI":"10.1145\/3133956.3134020"},{"key":"ref_56","unstructured":"Ba, J., B\u00f6hme, M., Mirzamomen, Z., and Roychoudhury, A. (2022, January 10\u201312). Stateful greybox fuzzing. Proceedings of the 31st USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Stepanov, E., and Serebryany, K. (2015, January 7\u201311). MemorySanitizer: Fast detector of uninitialized memory use in C++. Proceedings of the 2015 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), San Francisco, CA, USA.","DOI":"10.1109\/CGO.2015.7054186"},{"key":"ref_58","unstructured":"Developers, L. (2024, November 19). Undefined Behavior Sanitizer. Available online: https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/1\/19\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:23:41Z","timestamp":1759919021000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/1\/19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["fi17010019"],"URL":"https:\/\/doi.org\/10.3390\/fi17010019","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,6]]}}}