{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:12:06Z","timestamp":1730214726877,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/dsc55868.2022.00038","type":"proceedings-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T15:45:08Z","timestamp":1664466308000},"page":"234-241","source":"Crossref","is-referenced-by-count":0,"title":["Automated Vulnerability Discovery System Based on Hybrid Execution"],"prefix":"10.1109","author":[{"given":"Tong","family":"Liu","sequence":"first","affiliation":[{"name":"(Beijing University of Posts and Telecommunications), Ministry of Education,Key Laboratory of Trustworthy Distributed Computing and Service,Beijing,China"}]},{"given":"Zhongru","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Cyberspace Studies,Beijing,China"}]},{"given":"Yuntao","family":"Zhang","sequence":"additional","affiliation":[{"name":"(Beijing University of Posts and Telecommunications), Ministry of Education,Key Laboratory of Trustworthy Distributed Computing and Service,Beijing,China"}]},{"given":"Zhehui","family":"Liu","sequence":"additional","affiliation":[{"name":"(Beijing University of Posts and Telecommunications), Ministry of Education,Key Laboratory of Trustworthy Distributed Computing and Service,Beijing,China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"(Beijing University of Posts and Telecommunications), Ministry of Education,Key Laboratory of Trustworthy Distributed Computing and Service,Beijing,China"}]},{"given":"Zhengyuan","family":"Pang","sequence":"additional","affiliation":[{"name":"Beijing DigApis Technology Co., Ltd,Beijing,China,100871"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"journal-title":"American Fuzzy Lop","year":"0","author":"zalewski","key":"ref12"},{"journal-title":"A library for coverage-duided fuzz testing","year":"0","key":"ref13"},{"journal-title":"An easy-to-use fuzzer with interesting analysis options","year":"0","author":"wiecki","key":"ref14"},{"key":"ref15","first-page":"489","volume":"45","author":"b\u00f6hme","year":"2017","journal-title":"Coverage-based grey-box fuzzing as markov chain"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"ref19","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"cadar","year":"2008","journal-title":"OSDI"},{"journal-title":"Robot hacking game","year":"0","key":"ref28"},{"key":"ref4","first-page":"82","volume":"56","author":"cadar","year":"2013","journal-title":"Symbolic execution for software testing Three decades later Commun ACM"},{"year":"0","key":"ref27","article-title":"Non-deterministic polynomial complete"},{"key":"ref3","first-page":"3","article-title":"Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software","volume":"5","author":"newsome","year":"2005","journal-title":"NDSS"},{"key":"ref6","article-title":"Problem solving for the 21st century: Efficient solver for satisfiability modulo theories","author":"barrett","year":"2014","journal-title":"London Mathematical Society and Smith Institute for Industrial Mathematics…"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref5","article-title":"Fuzzing: the state of the art","author":"mcnally","year":"2012","journal-title":"DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA) Tech Rep"},{"key":"ref8","article-title":"Selective symbolic execution","author":"chipounov","year":"2009","journal-title":"Proceedings of the 5th Workshop on Hot Topics in System Dependability (HotDep)"},{"key":"ref7","first-page":"1","volume":"51","author":"baldoni","year":"2018","journal-title":"A survey of symbolic execution techniques"},{"key":"ref2","first-page":"32","volume":"33","author":"miller","year":"1990","journal-title":"An empirical study of the reliability of UNIX utilities Communications of the ACM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"journal-title":"Common Vulnerabilities and Exposures","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref24","first-page":"40","volume":"55","author":"godefroid","year":"2012","journal-title":"Sage Whitebox fuzzing for security testing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"journal-title":"PostgreSQL The World's Most Advanced open source relational database","year":"0","key":"ref26"},{"journal-title":"Kubernetes","year":"0","key":"ref25"}],"event":{"name":"2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)","start":{"date-parts":[[2022,7,11]]},"location":"Guilin, China","end":{"date-parts":[[2022,7,13]]}},"container-title":["2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9899765\/9899766\/09900142.pdf?arnumber=9900142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T18:53:55Z","timestamp":1667501635000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9900142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dsc55868.2022.00038","relation":{},"subject":[],"published":{"date-parts":[[2022,7]]}}}