{"id":"https://openalex.org/W4415743965","doi":"https://doi.org/10.1109/qrs-c65679.2025.00099","title":"HFF-JIT: A Hybrid Fuzzing Framework for JIT Compiler Vulnerability Detection in JavaScript","display_name":"HFF-JIT: A Hybrid Fuzzing Framework for JIT Compiler Vulnerability Detection in JavaScript","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415743965","doi":"https://doi.org/10.1109/qrs-c65679.2025.00099"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Haotong Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haotong Ding","raw_affiliation_strings":["School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087728660","display_name":"Anni Li","orcid":"https://orcid.org/0000-0002-5197-4329"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anni Li","raw_affiliation_strings":["School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050920580","display_name":"Rexford Nii Ayitey Sosu","orcid":"https://orcid.org/0000-0001-5527-5114"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rexford Nii Ayitey Sosu","raw_affiliation_strings":["School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &amp; Communication Engineering Jiangsu University,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31688997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"767","last_page":"768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.769599974155426,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.769599974155426,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.08780000358819962,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.02979999966919422,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9416999816894531},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.7516000270843506},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6883000135421753},{"id":"https://openalex.org/keywords/just-in-time-compilation","display_name":"Just-in-time compilation","score":0.3982999920845032},{"id":"https://openalex.org/keywords/compile-time","display_name":"Compile time","score":0.3756999969482422},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.375},{"id":"https://openalex.org/keywords/rich-internet-application","display_name":"Rich Internet application","score":0.373199999332428},{"id":"https://openalex.org/keywords/intermediate-language","display_name":"Intermediate language","score":0.3653999865055084},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.34279999136924744}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9416999816894531},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8763999938964844},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.7516000270843506},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6883000135421753},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6151000261306763},{"id":"https://openalex.org/C76782552","wikidata":"https://www.wikidata.org/wiki/Q110546","display_name":"Just-in-time compilation","level":3,"score":0.3982999920845032},{"id":"https://openalex.org/C200833197","wikidata":"https://www.wikidata.org/wiki/Q333707","display_name":"Compile time","level":3,"score":0.3756999969482422},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.375},{"id":"https://openalex.org/C103048170","wikidata":"https://www.wikidata.org/wiki/Q725485","display_name":"Rich Internet application","level":3,"score":0.373199999332428},{"id":"https://openalex.org/C77660490","wikidata":"https://www.wikidata.org/wiki/Q244916","display_name":"Intermediate language","level":3,"score":0.3653999865055084},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.34279999136924744},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.33329999446868896},{"id":"https://openalex.org/C190902152","wikidata":"https://www.wikidata.org/wiki/Q1325106","display_name":"Optimizing compiler","level":3,"score":0.3301999866962433},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C198370458","wikidata":"https://www.wikidata.org/wiki/Q586459","display_name":"Type inference","level":3,"score":0.29980000853538513},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2962999939918518},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.28610000014305115},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2858999967575073},{"id":"https://openalex.org/C4069607","wikidata":"https://www.wikidata.org/wiki/Q868732","display_name":"Aliasing","level":3,"score":0.2842999994754791},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.2800999879837036},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2736999988555908},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C148027188","wikidata":"https://www.wikidata.org/wiki/Q907375","display_name":"Unit testing","level":3,"score":0.2671000063419342},{"id":"https://openalex.org/C2778361913","wikidata":"https://www.wikidata.org/wiki/Q7248437","display_name":"Program transformation","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.26190000772476196},{"id":"https://openalex.org/C139571649","wikidata":"https://www.wikidata.org/wiki/Q1156793","display_name":"Program optimization","level":3,"score":0.25529998540878296},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W4308642082","https://openalex.org/W4324007042","https://openalex.org/W4405181385"],"related_works":[],"abstract_inverted_index":{"Just-In-Time(JIT)":[0],"compilers":[1],"embedded":[2],"in":[3,54,63],"JavaScript":[4,55],"engines":[5],"significantly":[6],"boost":[7],"runtime":[8],"performance":[9],"but":[10],"also":[11],"introduce":[12],"difficult-to-detect":[13],"vulnerabilities.":[14],"Fuzz":[15],"testing":[16],"has":[17],"proven":[18],"effective":[19],"for":[20,49],"uncovering":[21],"such":[22],"flaws,":[23],"yet":[24],"many":[25],"existing":[26],"approaches":[27],"suffer":[28],"from":[29],"low":[30],"coverage":[31,119],"and":[32,71,74,93],"high":[33],"rates":[34],"of":[35],"invalid":[36],"or":[37],"uninteresting":[38],"inputs.":[39,101],"In":[40],"this":[41],"paper,":[42],"we":[43],"present":[44],"a":[45,88],"Hybrid":[46],"Fuzzing":[47],"Framework":[48],"JIT":[50],"Compiler":[51],"Vulnerability":[52],"Detection":[53],"(HFF-JIT).":[56],"The":[57],"framework":[58],"first":[59],"generates":[60],"test":[61],"cases":[62],"an":[64],"intermediate":[65],"representation":[66],"(IR)":[67],"to":[68,98],"ensure":[69],"syntactic":[70],"semantic":[72],"validity,":[73],"then":[75],"transforms":[76],"them":[77],"into":[78],"JavaScript.":[79],"It":[80],"combines":[81],"grammar-aware":[82],"generation":[83],"with":[84],"mutation-based":[85],"strategies,":[86],"incorporates":[87],"lightweight":[89],"type":[90],"inference":[91],"system,":[92],"employs":[94],"dynamic":[95],"environment":[96],"exploration":[97],"produce":[99],"high-quality":[100],"A":[102],"coverage-guided":[103],"minimization":[104],"step":[105],"keeps":[106],"the":[107],"corpus":[108],"compact":[109],"while":[110],"preserving":[111],"new":[112],"edge":[113,118],"coverage,":[114],"which":[115],"improves":[116],"HFF-JIT's":[117],"on":[120],"major":[121],"engines.":[122]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-31T00:00:00"}
