{"id":"https://openalex.org/W4389276254","doi":"https://doi.org/10.1093/comjnl/bxad110","title":"KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers","display_name":"KVFL: Key-Value-Based Persistent Fuzzing for IoT Web Servers","publication_year":2023,"publication_date":"2023-11-30","ids":{"openalex":"https://openalex.org/W4389276254","doi":"https://doi.org/10.1093/comjnl/bxad110"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxad110","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1093/comjnl/bxad110","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103245931","display_name":"Chiheng Wang","orcid":"https://orcid.org/0000-0001-6078-1337"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chiheng Wang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China"],"raw_orcid":"https://orcid.org/0000-0001-6078-1337","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083751433","display_name":"Shibin Zhao","orcid":"https://orcid.org/0000-0002-7598-5495"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shibin Zhao","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China"],"raw_orcid":"https://orcid.org/0000-0002-7598-5495","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078173956","display_name":"Jianshan Peng","orcid":"https://orcid.org/0009-0009-4941-1250"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianshan Peng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China"],"raw_orcid":"https://orcid.org/0009-0009-4941-1250","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015855630","display_name":"Junhu Zhu","orcid":"https://orcid.org/0000-0002-6914-2424"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junhu Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China"],"raw_orcid":"https://orcid.org/0000-0002-6914-2424","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Gaoxin District, Zhengzhou 450001 , China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103245931"],"corresponding_institution_ids":[],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.3749,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58287378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"67","issue":"5","first_page":"1892","last_page":"1909"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9821415543556213},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8332713842391968},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6071453094482422},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5599511861801147},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.5023078918457031},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49046632647514343},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.464307576417923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42306458950042725},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.38422510027885437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3303256332874298},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.30948781967163086},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14247605204582214},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10899978876113892}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9821415543556213},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8332713842391968},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6071453094482422},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5599511861801147},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.5023078918457031},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49046632647514343},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.464307576417923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42306458950042725},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.38422510027885437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3303256332874298},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30948781967163086},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14247605204582214},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10899978876113892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxad110","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1093/comjnl/bxad110","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G2461816210","display_name":null,"funder_award_id":"61402525","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2664000593","display_name":null,"funder_award_id":"61802115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4561353346","display_name":null,"funder_award_id":"61402526","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G882829931","display_name":null,"funder_award_id":"61502528","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2180970301","https://openalex.org/W2734941459","https://openalex.org/W2766540688","https://openalex.org/W2777430404","https://openalex.org/W2794670092","https://openalex.org/W2868435436","https://openalex.org/W2914954538","https://openalex.org/W2964241064","https://openalex.org/W2989119476","https://openalex.org/W3015383024","https://openalex.org/W3047947484","https://openalex.org/W3155102819","https://openalex.org/W3184876908","https://openalex.org/W3212565000","https://openalex.org/W4289038676","https://openalex.org/W4308835491"],"related_works":["https://openalex.org/W2347997421","https://openalex.org/W2484510436","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W4385301282","https://openalex.org/W3023977444","https://openalex.org/W2766647240"],"abstract_inverted_index":{"Abstract":[0],"As":[1],"the":[2,35,61,85,131,149,177,198,206,228],"number":[3],"of":[4,6,64,87,93,137,148,167,179,189],"Internet":[5],"Thing":[7],"(IoT)":[8],"devices":[9,26,47],"increases,":[10],"attacks":[11],"against":[12],"their":[13],"vulnerabilities":[14,44,221],"have":[15,48],"become":[16],"a":[17,104,140,165,172],"serious":[18],"threat.":[19],"The":[20,191],"web":[21],"servers":[22],"(WSs)":[23],"in":[24,45,66,123],"IoT":[25,46,67,99,200,248],"provide":[27],"management":[28],"services":[29],"for":[30,42,60,98],"end-users,":[31],"which":[32],"are":[33],"currently":[34,54],"major":[36],"attack":[37],"surface.":[38],"Several":[39],"fuzzing":[40,97,154,247],"solutions":[41],"identifying":[43],"been":[49],"proposed,":[50],"but":[51],"there":[52],"is":[53,242],"no":[55],"grey-box":[56,81,201],"fuzzer":[57,202],"specifically":[58],"designed":[59],"unique":[62],"features":[63],"WSs":[65,116,138],"to":[68,83,143,162,197],"effectively":[69],"detect":[70],"memory":[71],"corruption":[72],"vulnerabilities.":[73,236],"We":[74],"design":[75],"and":[76,90,111,120,170,211,230,244],"implement":[77],"KVFL,":[78],"an":[79],"efficient":[80,245],"fuzzer,":[82],"address":[84],"issues":[86],"low":[88],"throughput":[89,207],"slow":[91],"exploration":[92,188],"deep":[94],"code":[95,159,187],"when":[96],"WSs.":[100,190,249],"Firstly,":[101],"KVFL":[102,128,157,204,241],"employs":[103],"delicate":[105],"hooking":[106],"technology":[107],"that":[108,183,195,240],"heuristically":[109],"hijacks":[110],"emulates":[112],"hardware-dependent":[113],"functions,":[114],"ensuring":[115],"can":[117,184],"be":[118],"accurately":[119],"efficiently":[121],"emulated":[122],"user-mode.":[124],"On":[125],"this":[126],"basis,":[127],"fully":[129],"utilizes":[130],"loop":[132],"parsing":[133],"HTTP":[134],"requests":[135],"feature":[136],"through":[139],"redesigned":[141],"fork-server,":[142],"minimize":[144],"nonessential":[145],"rebooting":[146],"losses":[147],"target,":[150],"thereby":[151],"significantly":[152],"improving":[153],"throughput.":[155],"Secondly,":[156],"leverages":[158],"coverage":[160],"feedback":[161],"automatically":[163],"infer":[164],"set":[166],"valid":[168],"Keys":[169],"derive":[171],"Key-Value":[173],"mutation.":[174],"This":[175],"enables":[176],"generation":[178],"high-quality":[180],"test":[181],"cases":[182],"facilitate":[185],"deeper":[186],"evaluation":[192],"results":[193],"show":[194],"compared":[196],"state-of-the-art":[199],"FIRM-AFL,":[203],"improves":[205],"by":[208],"over":[209,223],"2\u00d7":[210],"explores":[212],"4.5\u00d7":[213],"more":[214],"edges.":[215],"Additionally,":[216],"it":[217],"identifies":[218],"all":[219,238],"1-day":[220],"with":[222],"7\u00d7":[224],"faster":[225],"speed":[226],"than":[227],"baseline":[229],"detects":[231],"three":[232],"previously":[233],"unknown":[234],"0-day":[235],"These":[237],"indicate":[239],"effective":[243],"at":[246]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
