{"id":"https://openalex.org/W7125978602","doi":"https://doi.org/10.1109/ase63991.2025.00136","title":"Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination","display_name":"Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination","publication_year":2025,"publication_date":"2025-11-16","ids":{"openalex":"https://openalex.org/W7125978602","doi":"https://doi.org/10.1109/ase63991.2025.00136"},"language":"en","primary_location":{"id":"doi:10.1109/ase63991.2025.00136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028417710","display_name":"J. Zabel","orcid":"https://orcid.org/0009-0008-1336-3245"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jonas Zabel","raw_affiliation_strings":["Fraunhofer SIT | ATHENE,Secure Software Engineering,Darmstadt,Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT | ATHENE,Secure Software Engineering,Darmstadt,Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027823678","display_name":"Philip Kolvenbach","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135606","display_name":"National Research Center for Applied Cybersecurity ATHENE","ror":"https://ror.org/0378v2g76","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210135606"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Philip Kolvenbach","raw_affiliation_strings":["DZ Bank,Information Security,Darmstadt,Germany"],"affiliations":[{"raw_affiliation_string":"DZ Bank,Information Security,Darmstadt,Germany","institution_ids":["https://openalex.org/I4210135606"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026715017","display_name":"Steven Arzt","orcid":"https://orcid.org/0000-0002-5807-9431"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steven Arzt","raw_affiliation_strings":["Fraunhofer SIT | ATHENE,Secure Software Engineering,Darmstadt,Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT | ATHENE,Secure Software Engineering,Darmstadt,Germany","institution_ids":["https://openalex.org/I4210133470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028417710"],"corresponding_institution_ids":["https://openalex.org/I4210133470"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76600123,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1616","last_page":"1628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8337000012397766},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5002999901771545},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.49790000915527344},{"id":"https://openalex.org/keywords/timeout","display_name":"Timeout","score":0.44909998774528503},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.43389999866485596},{"id":"https://openalex.org/keywords/graphical-user-interface","display_name":"Graphical user interface","score":0.3978999853134155},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.3813999891281128},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3662000000476837},{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.3424000144004822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8655999898910522},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8337000012397766},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5246000289916992},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5002999901771545},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C31691690","wikidata":"https://www.wikidata.org/wiki/Q1753979","display_name":"Timeout","level":2,"score":0.44909998774528503},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.43389999866485596},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.3978999853134155},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.3813999891281128},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3718999922275543},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3662000000476837},{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.3424000144004822},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.3221000134944916},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.30649998784065247},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.2937000095844269},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.2793999910354614},{"id":"https://openalex.org/C2777362769","wikidata":"https://www.wikidata.org/wiki/Q40056","display_name":"Computer program","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.2752000093460083},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C148027188","wikidata":"https://www.wikidata.org/wiki/Q907375","display_name":"Unit testing","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.25769999623298645},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.2549000084400177},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ase63991.2025.00136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ase63991.2025.00136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 40th IEEE/ACM International Conference on Automated Software Engineering (ASE)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/510909","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/510909","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2002934700","https://openalex.org/W2105983962","https://openalex.org/W2133692747","https://openalex.org/W2294434616","https://openalex.org/W2466114212","https://openalex.org/W2535617737","https://openalex.org/W2613534458","https://openalex.org/W2766540688","https://openalex.org/W2806377938","https://openalex.org/W2806746626","https://openalex.org/W2891235722","https://openalex.org/W2899781671","https://openalex.org/W2903305687","https://openalex.org/W2947109320","https://openalex.org/W2947182139","https://openalex.org/W2947265301","https://openalex.org/W2955968478","https://openalex.org/W2964097210","https://openalex.org/W2974819274","https://openalex.org/W2985896598","https://openalex.org/W3008477014","https://openalex.org/W3015365135","https://openalex.org/W3046946156","https://openalex.org/W3136127207","https://openalex.org/W3160978791","https://openalex.org/W4308632293","https://openalex.org/W4405170922"],"related_works":[],"abstract_inverted_index":{"When":[0],"fuzzing":[1,207,282],"a":[2,59,101,103,109,154,173,184,201,213],"proprietary":[3],"file-processing":[4,98,210],"program,":[5,151],"one":[6,167],"typically":[7],"executes":[8,114],"the":[9,76,81,84,89,115,129,133,146,150,159,170,217,220,242,247,258,273],"whole":[10],"program":[11,90,123,134,171,221,243],"repeatedly":[12],"with":[13,58,100,212],"sampled":[14],"input":[15,44,160,248,266],"files,":[16],"and":[17,21,70,86,120,152,197,275,279],"distinguishes":[18],"between":[19],"normal":[20],"abnormal":[22],"termination.":[23],"While":[24],"this":[25,126],"works":[26],"well":[27],"for":[28,36,253],"many":[29],"command-line":[30],"utilities,":[31],"it":[32,226],"is":[33,106,162],"more":[34],"complicated":[35],"programs":[37,99,211],"that":[38,188,225,241,270],"usually":[39],"do":[40],"not":[41],"terminate":[42,88,169],"after":[43,172,246],"file":[45,116],"processing.":[46,267],"Many":[47],"real-world":[48],"applications":[49],"are":[50,195],"examples":[51],"of":[52,83,132,149,208,219,251],"such":[53,64],"programs,":[54],"in":[55,118,139],"particular,":[56],"those":[57],"graphical":[60],"user":[61,235,254],"interface":[62],"(GUI),":[63],"as":[65],"image":[66],"editors,":[67],"media":[68],"players":[69],"document":[71],"viewers.":[72],"In":[73],"these":[74,189],"cases,":[75],"fuzzer":[77],"has":[78,181],"to":[79,94,107,156,193,204],"define":[80,108],"scope":[82],"execution":[85],"forcefully":[87],"under":[91,222],"test.In":[92],"order":[93],"efficiently":[95],"fuzz":[96],"test":[97,223],"GUI,":[102],"standard":[104],"approach":[105,203],"dedicated":[110],"testing":[111],"harness,":[112],"which":[113],"processing":[117,161,249],"isolation":[119],"strips":[121],"irrelevant":[122],"parts.":[124],"However,":[125],"either":[127],"requires":[128],"source":[130],"code":[131,230],"or":[135,176],"an":[136],"expert\u2019s":[137],"effort":[138],"reverse":[140],"engineering.":[141],"Alternative":[142],"approaches":[143],"work":[144],"on":[145],"unmodified":[147],"binary":[148,218],"use":[153],"heuristic":[155],"decide":[157],"when":[158,229],"likely":[163],"done.":[164],"For":[165],"example,":[166],"can":[168],"fixed":[174],"timeout":[175,274],"once":[177],"its":[178],"CPU":[179,276],"usage":[180,277],"dropped":[182],"below":[183],"threshold.":[185],"We":[186,268],"show":[187,269],"heuristics,":[190],"while":[191],"simple":[192],"implement,":[194],"inefficient":[196],"ineffective.We":[198],"present":[199],"Terminator,":[200],"fully-automated":[202],"facilitate":[205],"efficient":[206],"closed-source":[209],"GUI.":[214],"Terminator":[215,238,271],"modifies":[216],"so":[224],"automatically":[227],"terminates":[228,244],"coverage":[231],"stops":[232],"increasing":[233],"without":[234],"interaction.":[236],"Consequently,":[237],"(1)":[239],"ensures":[240],"soon":[245],"instead":[250],"waiting":[252],"interaction,":[255],"and,":[256],"at":[257],"same":[259],"time,":[260],"(2)":[261],"prevents":[262],"premature":[263],"termination":[264],"during":[265],"outperforms":[272],"heuristics":[278],"significantly":[280],"increases":[281],"efficiency.":[283]},"counts_by_year":[],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2026-01-29T00:00:00"}
