{"id":"https://openalex.org/W2912063542","doi":"https://doi.org/10.1109/access.2019.2894178","title":"InsFuzz: Fuzzing Binaries With Location Sensitivity","display_name":"InsFuzz: Fuzzing Binaries With Location Sensitivity","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2912063542","doi":"https://doi.org/10.1109/access.2019.2894178","mag":"2912063542"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2894178","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2894178","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08624255.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08624255.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102832379","display_name":"Hanfang Zhang","orcid":"https://orcid.org/0000-0003-1808-7864"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hanfang Zhang","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0003-1808-7864","affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110673615","display_name":"Anmin Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Zhou","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089704563","display_name":"Peng Jia","orcid":"https://orcid.org/0000-0002-0455-8779"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Jia","raw_affiliation_strings":["College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101574933","display_name":"Luping Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luping Liu","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China","College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101196687","display_name":"Jinxin Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinxin Ma","raw_affiliation_strings":["China Information Technology Security Evaluation Center, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Information Technology Security Evaluation Center, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100733031","display_name":"Liang Liu","orcid":"https://orcid.org/0000-0002-5612-1915"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Liu","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, China","College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102832379"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.9885,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76611379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"7","issue":null,"first_page":"22434","last_page":"22444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9718515872955322},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8923591375350952},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.848892092704773},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5102579593658447},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4813038408756256},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44903799891471863},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4149845242500305},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3997102677822113},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3300168514251709}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9718515872955322},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8923591375350952},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.848892092704773},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5102579593658447},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4813038408756256},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44903799891471863},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4149845242500305},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3997102677822113},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3300168514251709},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2894178","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2894178","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08624255.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:444d71bfd28440958049a5c865113686","is_oa":true,"landing_page_url":"https://doaj.org/article/444d71bfd28440958049a5c865113686","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 22434-22444 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2894178","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2894178","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08624255.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1984721189","display_name":null,"funder_award_id":"61502536","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4501933984","display_name":null,"funder_award_id":"61872836","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5203161543","display_name":null,"funder_award_id":"2017YFB0802900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7539257876","display_name":null,"funder_award_id":"2017YFB0802900","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2912063542.pdf","grobid_xml":"https://content.openalex.org/works/W2912063542.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W157156687","https://openalex.org/W208073541","https://openalex.org/W614438062","https://openalex.org/W1546956568","https://openalex.org/W1710734607","https://openalex.org/W1976878954","https://openalex.org/W1988524530","https://openalex.org/W2065948900","https://openalex.org/W2107147876","https://openalex.org/W2107510936","https://openalex.org/W2128128820","https://openalex.org/W2128985333","https://openalex.org/W2150990339","https://openalex.org/W2294434616","https://openalex.org/W2514578992","https://openalex.org/W2514974017","https://openalex.org/W2515236103","https://openalex.org/W2517087431","https://openalex.org/W2535617737","https://openalex.org/W2574017551","https://openalex.org/W2583649498","https://openalex.org/W2613534458","https://openalex.org/W2701225458","https://openalex.org/W2741068848","https://openalex.org/W2757104921","https://openalex.org/W2766540688","https://openalex.org/W2766647240","https://openalex.org/W2769748476","https://openalex.org/W2794670092","https://openalex.org/W2795192879","https://openalex.org/W2964097210","https://openalex.org/W3104664063","https://openalex.org/W3160978791","https://openalex.org/W4237492309","https://openalex.org/W4239813889","https://openalex.org/W4242377092","https://openalex.org/W4246166885","https://openalex.org/W6606430823","https://openalex.org/W6619192471","https://openalex.org/W6637688222","https://openalex.org/W6824137238"],"related_works":["https://openalex.org/W4282010060","https://openalex.org/W4225847901","https://openalex.org/W2912063542","https://openalex.org/W175863638","https://openalex.org/W614438062","https://openalex.org/W3173990398","https://openalex.org/W4205454537","https://openalex.org/W4226494072","https://openalex.org/W4385301282","https://openalex.org/W3170526652"],"abstract_inverted_index":{"Fuzzing":[0],"is":[1,6],"a":[2,43,97],"popular":[3],"technique":[4],"which":[5,74,101],"widely":[7],"used":[8],"to":[9,65,81,99],"find":[10],"the":[11,31,35,52,59,67,83,86,90,117,124,130,140,148,152,159,162,189,196,207,215,229],"software":[12],"bugs.":[13],"However,":[14],"fuzzing":[15,46],"remains":[16],"limited":[17],"in":[18,22,29],"finding":[19],"bugs":[20,187,205],"lying":[21],"deep":[23],"paths":[24],"since":[25],"it":[26],"has":[27],"difficulty":[28],"bypassing":[30],"complex":[32],"checks":[33],"of":[34,126,133,209],"target":[36],"program.":[37],"In":[38,113,199],"this":[39],"paper,":[40],"we":[41,75,115,122,192],"propose":[42],"location":[44],"sensitive":[45],"approach,":[47],"named":[48],"InsFuzz,":[49],"that":[50,69,183,191,206],"leverages":[51],"light-weight":[53],"program":[54],"analysis":[55,61],"technique.":[56],"We":[57,156],"use":[58],"static":[60],"and":[62,89,106,138,170,223],"binary":[63],"instrumentation":[64],"infer":[66,82],"bytes":[68,88,102,109,128],"could":[70],"influence":[71],"comparison":[72,91,118,145,153],"instructions,":[73],"called":[76],"key":[77,87],"bytes,":[78],"and,":[79],"then,":[80],"relationship":[84],"between":[85,129],"instructions":[92,154],"during":[93,136],"execution.":[94],"This":[95],"enables":[96],"fuzzer":[98,149],"know":[100],"are":[103],"worth":[104],"mutating":[105],"how":[107],"these":[108],"should":[110],"be":[111],"mutated.":[112],"addition,":[114,200],"collect":[116],"progress":[119],"information":[120],"(i.e.,":[121],"record":[123],"number":[125],"matching":[127],"two":[131],"operands":[132],"an":[134],"instruction)":[135],"execution":[137],"preserve":[139],"mutated":[141],"inputs":[142],"with":[143,174,194,228],"higher":[144],"progress.":[146],"Therefore,":[147],"can":[150],"break":[151],"efficiently.":[155],"first":[157],"evaluated":[158],"InsFuzz":[160,173,184,201,218],"on":[161,176,195],"LAVA-M":[163,197,210],"dataset":[164],"against":[165],"other":[166],"fuzzers,":[167],"including":[168],"AFL-Dyninst,":[169],"then":[171],"compared":[172,193,227],"AFL-Dyninst":[175],"five":[177],"real-world":[178,216],"programs.":[179],"The":[180],"results":[181],"show":[182],"found":[185,202],"more":[186,220,225],"than":[188],"fuzzers":[190],"dataset.":[198],"some":[203],"new":[204],"author":[208],"did":[211],"not":[212],"list.":[213],"On":[214],"programs,":[217],"triggered":[219],"unique":[221],"crashes":[222],"covered":[224],"code":[226],"AFL-Dyninst.":[230]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
