{"id":"https://openalex.org/W4414079923","doi":"https://doi.org/10.1109/tifs.2025.3607249","title":"VPGFuzz: Vulnerable Path-Guided Greybox Fuzzing","display_name":"VPGFuzz: Vulnerable Path-Guided Greybox Fuzzing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414079923","doi":"https://doi.org/10.1109/tifs.2025.3607249"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3607249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607249","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083733506","display_name":"Zhechao Lin","orcid":"https://orcid.org/0000-0002-2342-2375"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhechao Lin","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046947918","display_name":"Jiahao Cao","orcid":"https://orcid.org/0000-0001-7139-376X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahao Cao","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011102366","display_name":"Xinda Wang","orcid":"https://orcid.org/0000-0003-3648-1750"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinda Wang","raw_affiliation_strings":["Department of Computer Science, The University of Texas at Dallas, Richardson, TX, USA","Department of Computer Science, University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]},{"raw_affiliation_string":"Department of Computer Science, University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052400360","display_name":"Renjie Xie","orcid":"https://orcid.org/0009-0004-1742-4122"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renjie Xie","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042827015","display_name":"Yuxi Zhu","orcid":"https://orcid.org/0000-0002-8345-1346"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxi Zhu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100375332","display_name":"Xiao Li","orcid":"https://orcid.org/0000-0003-2565-9883"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Li","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350165","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-8776-8730"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345141","display_name":"Yangyang Wang","orcid":"https://orcid.org/0000-0003-1720-6657"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Wang","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100771111","display_name":"Mingwei Xu","orcid":"https://orcid.org/0000-0002-4847-4585"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwei Xu","raw_affiliation_strings":["Department of Computer Science and Technology and the Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","Department of Computer Science and Technology, Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology and the Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Computer Science and Technology, Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5083733506"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20792224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"9584","last_page":"9599"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11663","display_name":"Viral Infectious Diseases and Gene Expression in Insects","score":0.9275000095367432,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T11663","display_name":"Viral Infectious Diseases and Gene Expression in Insects","score":0.9275000095367432,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9940999746322632},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6969000101089478},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5993000268936157},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.597100019454956},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.5846999883651733},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4941999912261963},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.48969998955726624},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.47859999537467957},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.46810001134872437},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.41749998927116394}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9940999746322632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9027000069618225},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6969000101089478},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5993000268936157},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.597100019454956},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.5846999883651733},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4941999912261963},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.48969998955726624},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.47859999537467957},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.46810001134872437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4611999988555908},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.41749998927116394},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.4172999858856201},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3952000141143799},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.3596000075340271},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3296000063419342},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.31360000371932983},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31310001015663147},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.3018999993801117},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.29660001397132874},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C2984328558","wikidata":"https://www.wikidata.org/wiki/Q188522","display_name":"Software testing","level":3,"score":0.2842000126838684},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.2770000100135803},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2712000012397766},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.2574999928474426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3607249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3607249","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1079342919","display_name":null,"funder_award_id":"62472246","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1419851695","display_name":null,"funder_award_id":"62202260","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4141425081","display_name":null,"funder_award_id":"623B2062","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7155321176","display_name":null,"funder_award_id":"62132011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7488493096","display_name":null,"funder_award_id":"62221003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2294693415","https://openalex.org/W2515236103","https://openalex.org/W2535617737","https://openalex.org/W2574017551","https://openalex.org/W2583649498","https://openalex.org/W2613534458","https://openalex.org/W2616028256","https://openalex.org/W2701225458","https://openalex.org/W2752340395","https://openalex.org/W2757104921","https://openalex.org/W2766540688","https://openalex.org/W2766711930","https://openalex.org/W2781491433","https://openalex.org/W2782780792","https://openalex.org/W2791018263","https://openalex.org/W2794670092","https://openalex.org/W2795192879","https://openalex.org/W2865298191","https://openalex.org/W2888047193","https://openalex.org/W2888824816","https://openalex.org/W2891235722","https://openalex.org/W2904932877","https://openalex.org/W2924194299","https://openalex.org/W2940243450","https://openalex.org/W2947182139","https://openalex.org/W2951091523","https://openalex.org/W2957905354","https://openalex.org/W2963674831","https://openalex.org/W2964097210","https://openalex.org/W2985495886","https://openalex.org/W3006130050","https://openalex.org/W3008477014","https://openalex.org/W3015365135","https://openalex.org/W3015383024","https://openalex.org/W3019428952","https://openalex.org/W3046946156","https://openalex.org/W3047947484","https://openalex.org/W3101845936","https://openalex.org/W3109101477","https://openalex.org/W3136918966","https://openalex.org/W3212565000","https://openalex.org/W3213337076","https://openalex.org/W4210660460","https://openalex.org/W4221146917","https://openalex.org/W4239035626","https://openalex.org/W4308244727","https://openalex.org/W4324007167"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4210660460","https://openalex.org/W3203597304"],"abstract_inverted_index":{"Fuzzing":[0],"is":[1,108],"a":[2,70,93,147,157],"prevalent":[3],"technology":[4],"for":[5,88,138,150,160,169],"identifying":[6],"software":[7],"vulnerabilities.":[8,39],"Existing":[9],"fuzzing":[10,62],"techniques":[11],"predominantly":[12],"focus":[13],"on":[14,123],"maximizing":[15],"code":[16,29,50,80],"coverage":[17],"to":[18,98,133,207],"unearth":[19],"potential":[20,53],"security":[21],"issues.":[22],"However,":[23],"the":[24,61,202],"mere":[25],"expansion":[26],"of":[27,38,120],"explored":[28],"does":[30],"not":[31,76],"necessarily":[32],"correlate":[33],"with":[34,102,110,182],"an":[35,128],"increased":[36],"discovery":[37],"Additionally,":[40],"existing":[41],"fuzzers":[42,213],"often":[43],"neglect":[44],"comprehensive":[45],"execution":[46,112],"path":[47,86,95],"information":[48],"in":[49,60,214],"exploration.":[51],"Consequently,":[52],"vulnerabilities":[54],"may":[55],"be":[56],"delayed":[57],"or":[58],"overlooked":[59],"process.":[63],"To":[64],"address":[65],"this,":[66],"we":[67],"propose":[68],"VPGFUZZ,":[69],"vulnerable":[71,94,104],"path-guided":[72],"fuzzer":[73],"that":[74,145,176],"can":[75],"only":[77],"explore":[78],"new":[79,152],"but":[81],"also":[82,195],"exploit":[83],"known":[84],"vulnerability":[85,89,117,185,204],"knowledge":[87],"discovery.":[90],"It":[91],"employs":[92],"recognition":[96],"model":[97,107],"identify":[99],"test":[100,136,162],"cases":[101,137,163],"potentially":[103,166],"paths.":[105],"This":[106],"trained":[109],"various":[111],"paths":[113],"derived":[114],"from":[115,187],"real-world":[116],"PoCs":[118],"(Proof":[119],"Concepts).":[121],"Based":[122],"this":[124,154],"model,":[125],"VPGFUZZ":[126,177],"applies":[127],"explore-exploit":[129],"seed":[130,142],"selection":[131,143],"strategy":[132,155],"effectively":[134],"choose":[135],"testing.":[139,172],"Unlike":[140],"traditional":[141],"methods":[144],"maintain":[146],"single":[148],"queue":[149,159],"exploring":[151],"code,":[153],"includes":[156],"separate":[158],"retaining":[161],"identified":[164],"as":[165,191],"vulnerable,":[167],"allowing":[168],"more":[170],"thorough":[171],"Experimental":[173],"results":[174],"demonstrate":[175],"discovers":[178],"24":[179],"zero-day":[180],"vulnerabilities,":[181],"18":[183],"receiving":[184],"identifiers":[186],"third-party":[188],"organizations":[189],"such":[190],"CVE.":[192],"Our":[193],"evaluation":[194],"shows":[196],"VPGFUZZ\u2019s":[197],"superior":[198],"efficiency":[199],"by":[200],"uncovering":[201],"first":[203],"approximately":[205],"1.2":[206],"70":[208],"times":[209],"faster":[210],"than":[211],"popular":[212],"most":[215],"programs.":[216]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
