{"id":"https://openalex.org/W2998205945","doi":"https://doi.org/10.1109/icct46805.2019.8947153","title":"Deity: Finding Deep Rooted Bugs in JavaScript Engines","display_name":"Deity: Finding Deep Rooted Bugs in JavaScript Engines","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2998205945","doi":"https://doi.org/10.1109/icct46805.2019.8947153","mag":"2998205945"},"language":"en","primary_location":{"id":"doi:10.1109/icct46805.2019.8947153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039662474","display_name":"Hongyang Lin","orcid":"https://orcid.org/0000-0002-6581-7033"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hongyang Lin","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102489106","display_name":"Junhu Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junhu Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078173956","display_name":"Jianshan Peng","orcid":"https://orcid.org/0009-0009-4941-1250"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianshan Peng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101068402","display_name":"Zhu Dixia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dixia Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039662474"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3291,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67093927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2019","issue":null,"first_page":"1585","last_page":"1594"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.977399468421936},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.9230055809020996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8077463507652283},{"id":"https://openalex.org/keywords/abstract-syntax-tree","display_name":"Abstract syntax tree","score":0.6517345905303955},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6282173991203308},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.564715564250946},{"id":"https://openalex.org/keywords/unobtrusive-javascript","display_name":"Unobtrusive JavaScript","score":0.5074123740196228},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.4394114017486572},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.39698418974876404},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3287329077720642},{"id":"https://openalex.org/keywords/rich-internet-application","display_name":"Rich Internet application","score":0.30622386932373047},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21920496225357056},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.21336758136749268},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11549621820449829}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.977399468421936},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.9230055809020996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8077463507652283},{"id":"https://openalex.org/C58646249","wikidata":"https://www.wikidata.org/wiki/Q127380","display_name":"Abstract syntax tree","level":3,"score":0.6517345905303955},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6282173991203308},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.564715564250946},{"id":"https://openalex.org/C198240166","wikidata":"https://www.wikidata.org/wiki/Q2298909","display_name":"Unobtrusive JavaScript","level":4,"score":0.5074123740196228},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.4394114017486572},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.39698418974876404},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3287329077720642},{"id":"https://openalex.org/C103048170","wikidata":"https://www.wikidata.org/wiki/Q725485","display_name":"Rich Internet application","level":3,"score":0.30622386932373047},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21920496225357056},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.21336758136749268},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11549621820449829},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icct46805.2019.8947153","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947153","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},{"id":"mag:3086132479","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002224134972817","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W116656696","https://openalex.org/W1531203382","https://openalex.org/W1878544538","https://openalex.org/W2002934700","https://openalex.org/W2029329147","https://openalex.org/W2090094826","https://openalex.org/W2146957318","https://openalex.org/W2153185479","https://openalex.org/W2515236103","https://openalex.org/W2519952770","https://openalex.org/W2535617737","https://openalex.org/W2766647240","https://openalex.org/W2883065350","https://openalex.org/W2947109320","https://openalex.org/W2963350015","https://openalex.org/W4246166885","https://openalex.org/W6631721891","https://openalex.org/W6639560864","https://openalex.org/W6753086718","https://openalex.org/W6757252433"],"related_works":["https://openalex.org/W650647575","https://openalex.org/W597036300","https://openalex.org/W2477981260","https://openalex.org/W36303035","https://openalex.org/W2617623045","https://openalex.org/W4231812305","https://openalex.org/W2505509890","https://openalex.org/W827014118","https://openalex.org/W2500345013","https://openalex.org/W2739095887"],"abstract_inverted_index":{"Fuzzing":[0],"[1]":[1],"is":[2],"a":[3,24,80],"well-known":[4],"technique":[5],"which":[6,60,128],"was":[7],"employed":[8],"to":[9,17,62],"provide":[10],"unexpected":[11],"or":[12,49],"random":[13],"data":[14],"as":[15,43],"input":[16,31],"JavaScript":[18,87,98],"engines":[19,99],"in":[20],"hopes":[21],"of":[22,84,94],"finding":[23,118],"security":[25],"vulnerability.":[26],"For":[27,96],"effective":[28],"fuzzing,":[29,106],"the":[30,64,92],"must":[32],"be":[33],"both":[34],"syntactically":[35],"correct":[36],"and":[37,75,117,140],"uncommonly":[38],"randomized":[39],"for":[40],"exceptions":[41],"such":[42],"crashes,":[44],"failing":[45],"built-in":[46],"code":[47,115],"assertions,":[48],"potential":[50],"memory":[51],"leaks.":[52],"In":[53],"this":[54],"work,":[55],"we":[56,129],"introduced":[57],"system":[58],"Deity":[59,112],"managed":[61],"resolve":[63],"conflict":[65],"with":[66,134],"innovative":[67],"AST(Abstract":[68],"Syntax":[69],"Tree)":[70],"[2]":[71],"based":[72],"tree":[73],"mutation":[74],"generating":[76],"methods.":[77],"It":[78],"leverages":[79],"high-level":[81],"structural":[82],"representation":[83],"intermediate":[85],"process":[86],"code.":[88],"Our":[89],"evaluation":[90],"demonstrates":[91],"effectiveness":[93],"Deity.":[95],"large-scale":[97],"(njs,":[100],"mjs,":[101],"Javascript-Core,":[102],"ChakraCore,":[103],"Espruino,":[104],"Jerryscript)":[105],"our":[107],"results":[108],"significantly":[109],"show":[110],"that":[111],"can":[113],"improve":[114],"coverage":[116],"more":[119],"deep":[120],"rooted":[121],"bugs":[122],"(i.e.,":[123],"35":[124],"new":[125,132],"bugs,":[126],"among":[127],"discovered":[130],"21":[131],"vulnerabilities":[133],"3":[135],"CVEs":[136],"assigned)":[137],"over":[138],"Superion":[139],"CodeAlchemist.":[141]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
