{"id":"https://openalex.org/W7123342626","doi":"https://doi.org/10.1109/dsa66321.2025.00017","title":"JMFUZZ: Firmware Fuzzing Using Temporal-Aware Multi-Stream Co-Mutation","display_name":"JMFUZZ: Firmware Fuzzing Using Temporal-Aware Multi-Stream Co-Mutation","publication_year":2025,"publication_date":"2025-11-24","ids":{"openalex":"https://openalex.org/W7123342626","doi":"https://doi.org/10.1109/dsa66321.2025.00017"},"language":null,"primary_location":{"id":"doi:10.1109/dsa66321.2025.00017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108991938","display_name":"Jiangyun Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiangyun Xu","raw_affiliation_strings":["University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101698293","display_name":"Jinbo Wang","orcid":"https://orcid.org/0000-0002-3527-1551"},"institutions":[{"id":"https://openalex.org/I4210086028","display_name":"Technology and Engineering Center for Space Utilization","ror":"https://ror.org/00cn03n83","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210086028"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Wang","raw_affiliation_strings":["Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China","institution_ids":["https://openalex.org/I4210086028","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122906866","display_name":"Yunyun Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I4210086028","display_name":"Technology and Engineering Center for Space Utilization","ror":"https://ror.org/00cn03n83","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210086028"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunyun Ma","raw_affiliation_strings":["Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China","institution_ids":["https://openalex.org/I4210086028","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122888254","display_name":"Chi Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210086028","display_name":"Technology and Engineering Center for Space Utilization","ror":"https://ror.org/00cn03n83","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210086028"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China","institution_ids":["https://openalex.org/I4210086028","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075435632","display_name":"Yu Su","orcid":"https://orcid.org/0000-0003-4306-0161"},"institutions":[{"id":"https://openalex.org/I4210086028","display_name":"Technology and Engineering Center for Space Utilization","ror":"https://ror.org/00cn03n83","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210086028"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Su","raw_affiliation_strings":["Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Technology and Engineering Center for Space Utilization,Beijing,China","institution_ids":["https://openalex.org/I4210086028","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108991938"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.73802682,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9282000064849854},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8264999985694885},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6068000197410583},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5041000247001648},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44359999895095825},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4377000033855438},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4269999861717224},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.4228000044822693}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9282000064849854},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8264999985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7675999999046326},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6068000197410583},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5041000247001648},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4377000033855438},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.4228000044822693},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.3571000099182129},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.32359999418258667},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C501734568","wikidata":"https://www.wikidata.org/wiki/Q42918","display_name":"Mutation","level":3,"score":0.32030001282691956},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3125},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.28780001401901245},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2842999994754791},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2761000096797943}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsa66321.2025.00017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0,25],"the":[1,26,33,47,61,76,107,133,159,167,197,202,241,261],"rapid":[2],"development":[3],"of":[4,31,64,109,163,268],"space":[5,9,205],"science":[6],"and":[7,22,29,43,56,118,131,136,186,220,229,234,244,273],"technology,":[8],"payload":[10,38],"software,":[11,18],"which":[12],"is":[13,89],"mainly":[14],"based":[15],"on":[16,127,190,247,271,276],"embedded":[17,54],"undertakes":[19],"key":[20],"control":[21],"management":[23],"tasks.":[24],"increasing":[27],"complexity":[28],"intelligence":[30],"tasks,":[32],"security":[34],"risks":[35],"faced":[36],"by":[37,201,226],"software":[39,55,59],"are":[40,97],"becoming":[41],"more":[42,44],"prominent.":[45],"However,":[46],"significant":[48],"differences":[49],"in":[50,113,120,166],"runtime":[51],"environments":[52],"between":[53],"conventional":[57],"host":[58],"complicate":[60],"direct":[62],"application":[63],"mature":[65],"automated":[66],"testing":[67],"methods,":[68],"such":[69,184],"as":[70,91],"fuzzing.":[71],"Recent":[72],"studies":[73],"have":[74],"adopted":[75],"multi-stream":[77],"input":[78,141],"model":[79],"for":[80,216],"firmware":[81,249,263],"fuzzing,":[82],"where":[83],"each":[84,178],"peripheral":[85,173],"register":[86,174],"access":[87,175],"context":[88],"treated":[90],"an":[92],"independent":[93],"stream.":[94],"These":[95],"streams":[96,130],"combined":[98],"to":[99],"form":[100],"a":[101,150,212,236],"complete":[102],"test":[103,164],"case,":[104],"effectively":[105],"addressing":[106],"limitations":[108],"traditional":[110],"file-based":[111],"fuzzing":[112,179],"triggering":[114],"deep":[115],"code":[116,258],"paths":[117],"vulnerabilities":[119],"firmware.":[121],"Nevertheless,":[122],"these":[123],"approaches":[124],"primarily":[125],"focus":[126],"mutating":[128],"individual":[129],"overlook":[132],"temporal":[134],"relationships":[135],"semantic":[137],"correlations":[138],"among":[139],"multiple":[140],"streams.":[142,194],"To":[143,195],"overcome":[144],"this":[145,147],"limitation,":[146],"paper":[148],"proposes":[149],"novel":[151],"temporal-aware":[152],"multistream":[153],"cooperative":[154,188,208],"mutation":[155,222],"strategy.":[156],"By":[157],"analyzing":[158],"historical":[160],"execution":[161],"traces":[162],"cases":[165],"corpus,":[168],"our":[169],"approach":[170],"extracts":[171],"frequent":[172,217],"sequences.":[176],"In":[177],"iteration,":[180],"it":[181,246],"selects":[182],"one":[183],"sequence":[185,218],"performs":[187],"mutations":[189],"all":[191],"its":[192],"constituent":[193],"address":[196],"efficiency":[198],"challenge":[199],"caused":[200],"expanded":[203],"search":[204],"resulting":[206],"from":[207],"mutation,":[209],"we":[210],"design":[211],"reinforcement":[213],"learning-based":[214],"method":[215],"selection":[219,224],"employ":[221],"operator":[223],"driven":[225],"information":[227],"entropy":[228],"location":[230],"awareness.":[231],"We":[232],"designed":[233],"implemented":[235],"new":[237],"fuzzer,":[238],"JMFUZZ,":[239],"incorporating":[240],"proposed":[242],"method,":[243],"evaluated":[245],"real-world":[248],"targets.":[250],"Experimental":[251],"results":[252],"demonstrate":[253],"that":[254],"JMFUZZ":[255],"achieves":[256],"higher":[257],"coverage":[259],"than":[260],"state-of-the-art":[262],"fuzzer":[264],"Hoedur,":[265],"with":[266],"improvements":[267],"6.16":[269],"%":[270,275],"Contiki-NG":[272],"1.85":[274],"Console.":[277]},"counts_by_year":[],"updated_date":"2026-01-14T00:46:21.520733","created_date":"2026-01-14T00:00:00"}
