{"id":"https://openalex.org/W3056809327","doi":"https://doi.org/10.1109/iske47853.2019.9170295","title":"Network Protocol Automatic Vulnerability Mining Technology Based on Fuzzing","display_name":"Network Protocol Automatic Vulnerability Mining Technology Based on Fuzzing","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3056809327","doi":"https://doi.org/10.1109/iske47853.2019.9170295","mag":"3056809327"},"language":"en","primary_location":{"id":"doi:10.1109/iske47853.2019.9170295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske47853.2019.9170295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100412765","display_name":"Jintao Zhang","orcid":"https://orcid.org/0000-0001-6909-0612"},"institutions":[{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]},{"id":"https://openalex.org/I2799449666","display_name":"State Ethnic Affairs Commission","ror":"https://ror.org/01p9g6b97","country_code":"CN","type":"government","lineage":["https://openalex.org/I2799449666"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jintao Zhang","raw_affiliation_strings":["SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China"],"affiliations":[{"raw_affiliation_string":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","institution_ids":["https://openalex.org/I2799449666"]},{"raw_affiliation_string":"Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China","institution_ids":["https://openalex.org/I2799449666","https://openalex.org/I6645349"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061832481","display_name":"Duyu Liu","orcid":"https://orcid.org/0000-0003-0869-082X"},"institutions":[{"id":"https://openalex.org/I2799449666","display_name":"State Ethnic Affairs Commission","ror":"https://ror.org/01p9g6b97","country_code":"CN","type":"government","lineage":["https://openalex.org/I2799449666"]},{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duyu Liu","raw_affiliation_strings":["SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China"],"affiliations":[{"raw_affiliation_string":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","institution_ids":["https://openalex.org/I2799449666"]},{"raw_affiliation_string":"Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China","institution_ids":["https://openalex.org/I2799449666","https://openalex.org/I6645349"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101670319","display_name":"Wei Xiang","orcid":"https://orcid.org/0000-0002-4297-7034"},"institutions":[{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]},{"id":"https://openalex.org/I2799449666","display_name":"State Ethnic Affairs Commission","ror":"https://ror.org/01p9g6b97","country_code":"CN","type":"government","lineage":["https://openalex.org/I2799449666"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xiang","raw_affiliation_strings":["SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China"],"affiliations":[{"raw_affiliation_string":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China","institution_ids":["https://openalex.org/I2799449666"]},{"raw_affiliation_string":"Key Laboratory of Electronic and Information Engineering, SouthwestMinzuUniversity State Ethnic Affairs Commission, ChengDu, China","institution_ids":["https://openalex.org/I2799449666","https://openalex.org/I6645349"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100412765"],"corresponding_institution_ids":["https://openalex.org/I2799449666","https://openalex.org/I6645349"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22695471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"850","last_page":"856"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9906364679336548},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8384726047515869},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.63564133644104},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6045756340026855},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5851148366928101},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5761035084724426},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5720131397247314},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.5341260433197021},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5339739322662354},{"id":"https://openalex.org/keywords/disk-formatting","display_name":"Disk formatting","score":0.5132632255554199},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5065571069717407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4494131803512573},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4390515387058258},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.4112963080406189},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.38819780945777893},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3726606070995331},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36939239501953125},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.29067856073379517},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1010807454586029}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9906364679336548},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8384726047515869},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.63564133644104},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6045756340026855},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5851148366928101},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5761035084724426},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5720131397247314},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.5341260433197021},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5339739322662354},{"id":"https://openalex.org/C88006597","wikidata":"https://www.wikidata.org/wiki/Q690117","display_name":"Disk formatting","level":2,"score":0.5132632255554199},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5065571069717407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4494131803512573},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4390515387058258},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.4112963080406189},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.38819780945777893},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3726606070995331},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36939239501953125},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29067856073379517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1010807454586029},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iske47853.2019.9170295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske47853.2019.9170295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1489157620","https://openalex.org/W1575941242","https://openalex.org/W1988524530","https://openalex.org/W2082314767","https://openalex.org/W2082907410","https://openalex.org/W2102970979","https://openalex.org/W2133217855","https://openalex.org/W2164253698","https://openalex.org/W2319538084","https://openalex.org/W2361966991","https://openalex.org/W2785773370","https://openalex.org/W2806377938","https://openalex.org/W4244461107"],"related_works":["https://openalex.org/W2316974788","https://openalex.org/W2381594293","https://openalex.org/W2551594732","https://openalex.org/W2367489380","https://openalex.org/W2479612266","https://openalex.org/W4297792550","https://openalex.org/W3154327225","https://openalex.org/W2180474751","https://openalex.org/W2082907410","https://openalex.org/W2374073985"],"abstract_inverted_index":{"With":[0],"the":[1,9,24,33,77,120,125,135,150,177],"increasing":[2],"complexity":[3],"and":[4,18,40,46,61,91,107,128],"importance":[5],"of":[6,23,35,44,57,69,87,99,122,179],"network":[7,13,36,88,144,180],"applications,":[8],"security":[10,34,178],"requirements":[11],"for":[12,153,175],"protocols":[14,37],"are":[15,147],"getting":[16],"higher":[17],"higher.":[19],"Fuzzing,":[20],"as":[21,55],"one":[22],"important":[25,52],"Testing":[26],"techniques":[27],"to":[28,76,94,112,141,149],"discover":[29],"undisclosed":[30],"vulnerabilities,":[31,123],"tests":[32],"by":[38],"producing":[39],"sending":[41],"large":[42,97],"amounts":[43],"data":[45,101],"injecting":[47],"them":[48],"into":[49],"software,":[50],"many":[51],"vulnerabilities":[53],"such":[54],"denial":[56],"service,":[58],"buffer":[59],"overflows,":[60],"formatting":[62],"strings":[63],"can":[64,72],"be":[65,73],"found.":[66],"Manual":[67],"generation":[68],"test":[70,100],"cases":[71],"more":[74,162],"appropriate":[75],"target":[78,152],"under":[79],"test,":[80],"but":[81],"manual":[82,165],"Fuzzing":[83],"requires":[84],"accurate":[85],"understanding":[86],"protocol":[89],"details":[90],"tedious":[92],"work":[93],"construct":[95,142],"a":[96,131,172],"number":[98],"sets,":[102],"resulting":[103],"in":[104,167],"limited":[105],"coverage":[106],"poor":[108],"effect.":[109],"In":[110],"order":[111],"solve":[113],"this":[114,116,159],"problem,":[115],"paper":[117],"first":[118],"investigates":[119],"types":[121],"summarizes":[124],"fuzzy":[126],"strategies,":[127],"then":[129],"constructs":[130],"fuzzer":[132],"based":[133],"on":[134],"existing":[136],"framework,":[137],"adopts":[138],"mutation":[139],"strategy":[140],"malformed":[143],"packets,":[145],"which":[146,170],"sent":[148],"tested":[151],"testing.":[154],"The":[155],"results":[156],"show":[157],"that":[158],"method":[160],"is":[161],"efficient":[163],"than":[164],"analysis":[166],"vulnerability":[168],"mining,":[169],"provides":[171],"good":[173],"foundation":[174],"improving":[176],"protocols.":[181]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
