{"id":"https://openalex.org/W4312652269","doi":"https://doi.org/10.1109/dsc55868.2022.00038","title":"Automated Vulnerability Discovery System Based on Hybrid Execution","display_name":"Automated Vulnerability Discovery System Based on Hybrid Execution","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4312652269","doi":"https://doi.org/10.1109/dsc55868.2022.00038"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc55868.2022.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100392657","display_name":"Tong Liu","orcid":"https://orcid.org/0000-0002-5863-4351"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Liu","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006784389","display_name":"Zhongru Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210118789","display_name":"Chinese Academy of Personnel Science","ror":"https://ror.org/02wstxe29","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210118789"]},{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongru Wang","raw_affiliation_strings":["Chinese Academy of Cyberspace Studies, Beijing, China","School of Information Science and Technology, North China University of Technology, Beijing, 100144"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Cyberspace Studies, Beijing, China","institution_ids":["https://openalex.org/I4210118789"]},{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, 100144","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101836053","display_name":"Yuntao Zhang","orcid":"https://orcid.org/0000-0003-0948-9722"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Zhang","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025348853","display_name":"Zhehui Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhehui Liu","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113587199","display_name":"Binxing Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binxing Fang","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084864426","display_name":"Zhengyuan Pang","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengyuan Pang","raw_affiliation_strings":["Beijing DigApis Technology Co., Ltd,Beijing,China,100871","JiangSu DigApis Technology Co., Ltd, Nantong, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"JiangSu DigApis Technology Co., Ltd, Nantong, Jiangsu, China","institution_ids":[]},{"raw_affiliation_string":"Beijing DigApis Technology Co., Ltd,Beijing,China,100871","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.277,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.391742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":59,"max":69},"biblio":{"volume":"45","issue":null,"first_page":"234","last_page":"241"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.7174606},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability Modulo Theories","score":0.5983454},{"id":"https://openalex.org/keywords/concolic-testing","display_name":"Concolic testing","score":0.5181421},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.509191},{"id":"https://openalex.org/keywords/solver","display_name":"Solver","score":0.45987764}],"concepts":[{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.8763065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87302583},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.7174606},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.5983454},{"id":"https://openalex.org/C11219265","wikidata":"https://www.wikidata.org/wiki/Q5158734","display_name":"Concolic testing","level":4,"score":0.5181421},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.509191},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5047928},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.47363323},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46472532},{"id":"https://openalex.org/C2778770139","wikidata":"https://www.wikidata.org/wiki/Q1966904","display_name":"Solver","level":2,"score":0.45987764},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35246903},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.24122432},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20903462},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.19106933},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11939579}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc55868.2022.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":null},{"funder":"https://openalex.org/F4320337504","funder_display_name":"Research and Development","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1546956568","https://openalex.org/W1710734607","https://openalex.org/W2009489720","https://openalex.org/W2102970979","https://openalex.org/W2104993088","https://openalex.org/W2119236311","https://openalex.org/W2137530017","https://openalex.org/W2138788987","https://openalex.org/W2514974017","https://openalex.org/W2535617737","https://openalex.org/W2574017551","https://openalex.org/W2766540688","https://openalex.org/W2794670092","https://openalex.org/W2891235722","https://openalex.org/W2963723316","https://openalex.org/W3160978791","https://openalex.org/W4237492309"],"related_works":["https://openalex.org/W3172606155","https://openalex.org/W3161338937","https://openalex.org/W3104446232","https://openalex.org/W3019261932","https://openalex.org/W2785720764","https://openalex.org/W2777046235","https://openalex.org/W2186070848","https://openalex.org/W2184716478","https://openalex.org/W1992485833","https://openalex.org/W1572317885"],"abstract_inverted_index":{"At":[0],"present,":[1],"program":[2,64],"vulnerabilities":[3,70],"occur":[4],"frequently,":[5],"which":[6],"seriously":[7],"threatens":[8],"the":[9,30,54,63,73,80,92,98,104,108,114,119,135,150,154,167,172,175,205,214,224,230,239,244],"security":[10],"of":[11,24,33,56,82,107,191,243],"cyberspace.":[12],"Automated":[13],"vulnerability":[14,34,142],"discovery":[15,143],"technology":[16,48],"has":[17,76,122],"attracted":[18],"more":[19,21],"and":[20,27,59,125,162,186,193,229,241],"attention":[22],"because":[23],"its":[25],"efficiency":[26,124],"universality.":[28],"In":[29,131,149,196],"current":[31,120],"field":[32],"discovery,":[35],"it":[36,87],"is":[37,49,88],"common":[38],"to":[39,52,68,90,95,133,165,170,180,203,212],"combine":[40],"fuzzing":[41,61],"with":[42],"symbolic":[43,74,155,168],"execution":[44,47,75,84,93,156,169,216],"technology.":[45],"Symbolic":[46],"often":[50],"used":[51],"solve":[53,134,171],"input":[55,173],"complex":[57],"paths":[58,185],"help":[60],"improve":[62,213],"coverage,":[65],"so":[66,178,210],"as":[67,179,211],"detect":[69],"better.":[71],"However,":[72],"no":[77],"goals":[78],"in":[79,183],"process":[81],"hybrid":[83,147,215],"exploration":[85],"path,":[86],"easy":[89],"cause":[91],"path":[94,110],"deviate":[96],"from":[97],"expected":[99],"target":[100,176],"points.":[101],"And":[102],"generating":[103],"test":[105],"case":[106],"corresponding":[109],"requires":[111],"frequently":[112],"calling":[113],"solver":[115,121],"for":[116,128],"solution,":[117],"while":[118],"low":[123],"poor":[126],"solvability":[127],"nonlinear":[129,201,206],"operation.":[130],"order":[132],"above":[136],"problems,":[137],"we":[138,152,198],"propose":[139,153],"an":[140],"automated":[141],"system":[144],"based":[145,159],"on":[146,160,223],"execution.":[148],"system,":[151],"guidance":[157],"algorithm":[158],"dynamic":[161],"static":[163],"combination":[164],"guide":[166],"reaching":[174],"points,":[177],"avoid":[181,187],"exploring":[182],"useless":[184],"consuming":[188],"a":[189],"lot":[190],"time":[192],"computing":[194],"resources.":[195],"addition":[197],"hook":[199],"some":[200],"functions":[202],"optimize":[204],"function":[207],"constraint":[208],"solving,":[209],"efficiency.":[217],"We":[218],"have":[219],"conducted":[220],"extensive":[221],"experiments":[222],"RHG":[225,231],"2019":[226],"challenge":[227,233],"dataset":[228],"2021":[232],"dataset.":[234],"The":[235],"experimental":[236],"results":[237],"show":[238],"effectiveness":[240],"scalability":[242],"system.":[245]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4312652269","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-04-22T22:09:12.349291","created_date":"2023-01-05"}