{"id":"https://openalex.org/W1992372440","doi":"https://doi.org/10.1109/milcom.2011.6127448","title":"Fuzzing test data generation based on message matrix perturbation with keyword reference","display_name":"Fuzzing test data generation based on message matrix perturbation with keyword reference","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W1992372440","doi":"https://doi.org/10.1109/milcom.2011.6127448","mag":"1992372440"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127448","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020691988","display_name":"Shijia Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shijia Gu","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","[School of electronic engineering, Beijing University of Posts and Telecommunications, China]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"[School of electronic engineering, Beijing University of Posts and Telecommunications, China]","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082147367","display_name":"Yueyang Song","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueyang Song","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","[School of electronic engineering, Beijing University of Posts and Telecommunications, China]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"[School of electronic engineering, Beijing University of Posts and Telecommunications, China]","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102000525","display_name":"Xin Zhao","orcid":"https://orcid.org/0000-0002-0033-2756"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Zhao","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","[School of electronic engineering, Beijing University of Posts and Telecommunications, China]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"[School of electronic engineering, Beijing University of Posts and Telecommunications, China]","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102001334","display_name":"Weihai Li","orcid":"https://orcid.org/0000-0002-4023-8385"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weihai Li","raw_affiliation_strings":["School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","[School of electronic engineering, Beijing University of Posts and Telecommunications, China]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"[School of electronic engineering, Beijing University of Posts and Telecommunications, China]","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020691988"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.3929,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64874902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1115","last_page":"1120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9274642467498779},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8532666563987732},{"id":"https://openalex.org/keywords/robustness-testing","display_name":"Robustness testing","score":0.6680853366851807},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5519638657569885},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47530636191368103},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.46868494153022766},{"id":"https://openalex.org/keywords/test-data","display_name":"Test data","score":0.45008793473243713},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.4279632568359375},{"id":"https://openalex.org/keywords/logical-matrix","display_name":"Logical matrix","score":0.411008358001709},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35889554023742676},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3578795790672302},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32112249732017517},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22293120622634888},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1656014323234558},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10617288947105408}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9274642467498779},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8532666563987732},{"id":"https://openalex.org/C137726913","wikidata":"https://www.wikidata.org/wiki/Q7353550","display_name":"Robustness testing","level":3,"score":0.6680853366851807},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5519638657569885},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47530636191368103},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.46868494153022766},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.45008793473243713},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.4279632568359375},{"id":"https://openalex.org/C163561899","wikidata":"https://www.wikidata.org/wiki/Q1994977","display_name":"Logical matrix","level":3,"score":0.411008358001709},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35889554023742676},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3578795790672302},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32112249732017517},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22293120622634888},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1656014323234558},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10617288947105408},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127448","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W116656696","https://openalex.org/W179510128","https://openalex.org/W1535015034","https://openalex.org/W1538375546","https://openalex.org/W1963681878","https://openalex.org/W2016716561","https://openalex.org/W2049867480","https://openalex.org/W2111046645","https://openalex.org/W2115675703","https://openalex.org/W2149382744","https://openalex.org/W4229696998","https://openalex.org/W6632460521"],"related_works":["https://openalex.org/W4313066017","https://openalex.org/W167451129","https://openalex.org/W1964740600","https://openalex.org/W2297949281","https://openalex.org/W4381785649","https://openalex.org/W2884946294","https://openalex.org/W4226494072","https://openalex.org/W3133364053","https://openalex.org/W3091033583","https://openalex.org/W2991920445"],"abstract_inverted_index":{"Network":[0],"protocol":[1,10,30,55,72,91,157,227],"fuzzing":[2,31,228],"tries":[3],"to":[4,21,41,53,83,127,149,159,167,197],"test":[5,60,88,129,169,223],"the":[6,14,23,102,142,145,153,177,208,215,235,246,251],"robustness":[7,43],"of":[8,17,144,237,250],"a":[9,95,121,156,184],"implementation":[11],"through":[12,115,131,231],"exploring":[13],"infinite":[15],"amount":[16],"possible":[18],"anomalous":[19],"inputs":[20],"find":[22],"tests":[24],"that":[25],"cause":[26],"invalid":[27],"behaviors.":[28],"Therefore,":[29],"is":[32,39,139,195],"regarded":[33],"as":[34],"security":[35],"testing,":[36],"since":[37],"it":[38],"essential":[40],"prove":[42],"in":[44,58,78,107,171,179,253],"networks.":[45,80],"Although":[46],"many":[47],"good":[48,240],"practices":[49],"have":[50,74],"been":[51],"done":[52],"improve":[54],"fuzzing,":[56],"problems":[57],"automated":[59],"case":[61,130],"generation":[62],"are":[63,229,242],"still":[64],"unsolved.":[65],"Traditional":[66],"methods":[67],"using":[68],"formal":[69],"language":[70],"and":[71,110,219,248],"specification":[73],"evident":[75],"defects,":[76],"especially":[77],"close":[79],"In":[81],"order":[82],"provide":[84,198],"useful":[85,199],"references":[86],"for":[87,134,201,226],"data":[89,132,170,203],"generation,":[90],"reverse":[92],"engineering":[93],"becomes":[94],"suitable":[96],"solution.":[97],"But":[98],"approaches":[99],"adopted":[100],"during":[101],"last":[103],"decades":[104],"cost":[105],"much":[106],"computational":[108],"complexity":[109],"time":[111],"consumption.":[112],"To":[113],"break":[114],"these":[116],"limitations,":[117],"this":[118,254],"paper":[119],"proposes":[120],"novel":[122],"message":[123,158,217],"matrix":[124,218],"perturbing":[125,232],"mode":[126],"generate":[128,168],"mutation":[133],"application":[135],"layer":[136],"protocol.":[137],"It":[138],"established":[140],"on":[141,210],"basis":[143],"mapping":[146],"relationship":[147],"according":[148],"ASCII":[150],"code.":[151],"After":[152],"conversion":[154],"from":[155],"an":[160],"integer":[161],"matrix,":[162],"meta-perturbations":[163],"can":[164],"be":[165],"conducted":[166],"all":[172],"syntax":[173],"levels,":[174],"which":[175,244],"preserves":[176],"flexibility":[178],"complex":[180],"mutating":[181],"combinations.":[182],"Additionally,":[183],"new":[185],"statistical":[186],"keyword":[187,221],"extracting":[188],"technique":[189],"with":[190,234],"priority":[191],"recursive":[192],"splitting":[193],"pattern":[194],"introduced":[196],"information":[200],"intelligent":[202],"mutation.":[204],"Finally,":[205],"we":[206],"evaluate":[207],"method":[209],"HTTP":[211],"request":[212],"message.":[213],"With":[214],"transformed":[216],"corresponding":[220],"reference,":[222],"cases":[224],"examples":[225],"generated":[230],"process":[233],"combination":[236],"meta-operations.":[238],"Fairly":[239],"outcomes":[241],"achieved":[243],"illustrate":[245],"feasibility":[247],"efficiency":[249],"work":[252],"paper.":[255]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
