{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T14:44:57Z","timestamp":1726238697999},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031491863"},{"type":"electronic","value":"9783031491870"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49187-0_6","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T12:02:36Z","timestamp":1701345756000},"page":"99-118","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing"],"prefix":"10.1007","author":[{"given":"Wei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Huaijin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weixi","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"6_CR1","unstructured":"Trinity (2018). https:\/\/github.com\/kernelslacker\/trinity"},{"key":"6_CR2","unstructured":"The Top 10 Linux Kernel Vulnerabilities You Should Know (2019). https:\/\/resources.whitesourcesoftware.com\/blog-whitesource\/top-10-linux-kernel-vulnerabilities"},{"key":"6_CR3","unstructured":"Linux kernel mailing list (2023). https:\/\/lkml.org\/"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: continual prediction with LSTM (1999)","DOI":"10.1049\/cp:19991218"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. In: ACM Sigplan Notices, vol. 43, pp. 206\u2013215. ACM (2008)","DOI":"10.1145\/1379022.1375607"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: Sage: whitebox fuzzing for security testing. Commun. ACM 55(3), 40\u201344 (2012)","journal-title":"Commun. ACM"},{"key":"6_CR7","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A., et al.: Automated whitebox fuzz testing. In: NDSS, vol. 8, pp. 151\u2013166. Citeseer (2008)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Peleg, H., Singh, R.: Learn &fuzz: machine learning for input fuzzing. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, pp. 50\u201359. ASE 2017 (2017)","DOI":"10.1109\/ASE.2017.8115618"},{"key":"6_CR9","unstructured":"Google: Syzkaller (2018). https:\/\/github.com\/google\/syzkaller"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, R., Kanade, A., Shevade, S.: Deep reinforcement learning for syntactic error repair in student programs. In: Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence. AAAI 2019 (2019)","DOI":"10.1609\/aaai.v33i01.3301930"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Han, H., Cha, S.K.: IMF: inferred model-based fuzzer. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2345\u20132358. CCS \u201917 (2017)","DOI":"10.1145\/3133956.3134103"},{"key":"6_CR12","unstructured":"Hat, R.: Red hat Bugzilla (2023). https:\/\/bugzilla.redhat.com\/"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jeong, D.R., Kim, K., Shivakumar, B., Lee, B., Shin, I.: Razzer: finding kernel race bugs through fuzzing. In: Razzer: Finding Kernel Race Bugs through Fuzzing. IEEE (2019)","DOI":"10.1109\/SP.2019.00017"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Jiang, Z.M., Bai, J.J., Lawall, J., Hu, S.M.: Fuzzing error handling code in device drivers based on software fault injection (2019)","DOI":"10.1109\/ISSRE.2019.00022"},{"key":"6_CR15","unstructured":"Kernel, L.: Lore kernel (2023). https:\/\/lore.kernel.org\/lists.html"},{"key":"6_CR16","unstructured":"Mnih, V., et al.: Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)"},{"key":"6_CR17","unstructured":"OpenAI: Gpt-4 (2023). https:\/\/openai.com\/research\/gpt-4"},{"key":"6_CR18","unstructured":"Pailoor, S., Aday, A., Jana, S.: Moonshine: optimizing OS fuzzer seed selection with trace distillation. In: UNISEX Security (2018)"},{"key":"6_CR19","unstructured":"Rebert, A., et al.: Optimizing seed selection for fuzzing. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 861\u2013875. SEC\u201914, USENIX Association, USA (2014)"},{"key":"6_CR20","unstructured":"Si, X., Dai, H., Raghothaman, M., Naik, M., Song, L.: Learning loop invariants for program verification. In: Advances in Neural Information Processing Systems (NeurIPS) (2018)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Silver, D., et al.: Mastering the game of go with deep neural networks and tree search. Nature 529(7587), 484 (2016)","DOI":"10.1038\/nature16961"},{"key":"6_CR22","unstructured":"Skybox: 2019 Vulnerability and Threat Trends (2019). https:\/\/lp.skyboxsecurity.com\/rs\/440-MPQ-510\/images\/Skybox_Report_Vulnerability_and_Threat_Trends_2019.pdf"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Song, D., et al.: PeriScope: an effective probing and fuzzing framework for the hardware-OS boundary. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23176"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Szepesv\u00e1ri, C.: Algorithms for Reinforcement Learning. In: Synthesis Lectures on Artificial Intelligence and Machine Learning, vol. 4, no. 1, pp. 1\u2013103. Springer, Cham (2010). https:\/\/doi.org\/10.1007\/978-3-031-01551-9","DOI":"10.1007\/978-3-031-01551-9"},{"key":"6_CR25","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A Takanen","year":"2008","unstructured":"Takanen, A., DeMott, J., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance, 1st edn. Artech House Inc., USA (2008)","edition":"1"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, B., Wei, L., Liu, Y.: Skyfire: data-driven seed generation for fuzzing. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 579\u2013594. IEEE (2017)","DOI":"10.1109\/SP.2017.23"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Xu, W., Moon, H., Kashyap, S., Tseng, P.N., Kim, T.: Fuzzing file systems via two-dimensional input space exploration. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 818\u2013834. IEEE (2019)","DOI":"10.1109\/SP.2019.00035"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49187-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:05:45Z","timestamp":1701475545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49187-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031491863","9783031491870"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49187-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc23.cs.rug.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}