{"id":"https://openalex.org/W2999227841","doi":"https://doi.org/10.1109/ipccc47392.2019.8958740","title":"An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis","display_name":"An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2999227841","doi":"https://doi.org/10.1109/ipccc47392.2019.8958740","mag":"2999227841"},"language":"en","primary_location":{"id":"doi:10.1109/ipccc47392.2019.8958740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc47392.2019.8958740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053886363","display_name":"Yaowen Zheng","orcid":"https://orcid.org/0000-0002-8953-0782"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaowen Zheng","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,China","School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,China","institution_ids":["https://openalex.org/I4210165038","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082057811","display_name":"Zhanwei Song","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanwei Song","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China","Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101978012","display_name":"Yuyan Sun","orcid":"https://orcid.org/0000-0002-6360-590X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyan Sun","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China","Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing Key Laboratory of IoT Information Security Technology,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049540608","display_name":"Kai Cheng","orcid":"https://orcid.org/0000-0003-4565-8036"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Cheng","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,China","School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,China","institution_ids":["https://openalex.org/I4210165038","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087012171","display_name":"Hongsong Zhu","orcid":"https://orcid.org/0000-0003-3720-7403"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongsong Zhu","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,China","School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,China","institution_ids":["https://openalex.org/I4210165038","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["University of Chinese Academy of Sciences,School of Cyber Security,China","School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,School of Cyber Security,China","institution_ids":["https://openalex.org/I4210165038","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053886363"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.1718,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.80191791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9913514852523804},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8523409366607666},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7599155902862549},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.6971393823623657},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5206764936447144},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.5192418098449707},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4507026672363281},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4263834059238434},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4136390686035156},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.41171547770500183},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3476662337779999},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.22570785880088806},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12435615062713623}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9913514852523804},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8523409366607666},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7599155902862549},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.6971393823623657},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5206764936447144},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.5192418098449707},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4507026672363281},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4263834059238434},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4136390686035156},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.41171547770500183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3476662337779999},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.22570785880088806},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12435615062713623},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc47392.2019.8958740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipccc47392.2019.8958740","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1522250664","https://openalex.org/W2043118292","https://openalex.org/W2091939272","https://openalex.org/W2119812052","https://openalex.org/W2180277119","https://openalex.org/W2180970301","https://openalex.org/W2215262239","https://openalex.org/W2532962075","https://openalex.org/W2535617737","https://openalex.org/W2551934937","https://openalex.org/W2576376563","https://openalex.org/W2749008552","https://openalex.org/W2782780792","https://openalex.org/W2791018263","https://openalex.org/W2884769489","https://openalex.org/W3105926539","https://openalex.org/W6631155369","https://openalex.org/W6678042037"],"related_works":["https://openalex.org/W4378373752","https://openalex.org/W3006186133","https://openalex.org/W2008592783","https://openalex.org/W2179304688","https://openalex.org/W2159690530","https://openalex.org/W2004278744","https://openalex.org/W2107510936","https://openalex.org/W2924291353","https://openalex.org/W3113028789","https://openalex.org/W2966992680"],"abstract_inverted_index":{"With":[0],"the":[1,14,26,64,117,133],"rapid":[2],"growth":[3],"of":[4,85],"Linux-based":[5,59,80,146],"IoT":[6,37,60,81,92,110,118,125,147],"devices":[7],"such":[8],"as":[9],"network":[10],"cameras":[11],"and":[12,19,91,132],"routers,":[13],"security":[15],"becomes":[16],"a":[17,129],"concern":[18],"many":[20],"attacks":[21],"utilize":[22],"vulnerabilities":[23,35,143],"to":[24,33,58,63,101,115,123],"compromise":[25],"devices.":[27],"It":[28],"is":[29,42,100,114],"crucial":[30],"for":[31,48,79,106],"researchers":[32],"find":[34,142],"in":[36,144],"systems":[38],"before":[39],"attackers.":[40],"Fuzzing":[41],"an":[43,74],"effective":[44],"vulnerability":[45],"discovery":[46],"technique":[47],"traditional":[49],"desktop":[50],"programs,":[51],"but":[52],"could":[53,140],"not":[54],"be":[55],"directly":[56],"applied":[57],"programs":[61,82,148],"due":[62],"special":[65],"execution":[66],"environment":[67],"requirement.":[68],"In":[69],"our":[70,138],"paper,":[71],"we":[72],"propose":[73],"efficient":[75,107],"greybox":[76,94,112,121],"fuzzing":[77,113],"scheme":[78],"which":[83],"consist":[84],"two":[86],"phases:":[87],"binary":[88,97],"static":[89,98],"analysis":[90,99],"program":[93,111],"fuzzing.":[95,108],"The":[96,109],"help":[102],"generate":[103],"useful":[104],"inputs":[105],"reinforce":[116],"firmware":[119],"kernel":[120],"fuzzer":[122],"support":[124],"programs.":[126],"We":[127],"implement":[128],"prototype":[130],"system":[131,139],"evaluation":[134],"results":[135],"indicate":[136],"that":[137],"automatically":[141],"real-world":[145],"efficiently.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
