{"id":"https://openalex.org/W4415048639","doi":"https://doi.org/10.1109/tse.2025.3619966","title":"MirrorFuzz: Leveraging LLM and Shared Bugs for Deep Learning Framework APIs Fuzzing","display_name":"MirrorFuzz: Leveraging LLM and Shared Bugs for Deep Learning Framework APIs Fuzzing","publication_year":2025,"publication_date":"2025-10-10","ids":{"openalex":"https://openalex.org/W4415048639","doi":"https://doi.org/10.1109/tse.2025.3619966"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2025.3619966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3619966","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2510.15690","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shiwen Ou","orcid":"https://orcid.org/0009-0003-4561-5869"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shiwen Ou","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0009-0003-4561-5869","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100331391","display_name":"Yuwei Li","orcid":"https://orcid.org/0000-0002-8878-510X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwei Li","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-8878-510X","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lu Yu","orcid":"https://orcid.org/0000-0002-8524-0139"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Yu","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-8524-0139","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006624972","display_name":"Chengkun Wei","orcid":"https://orcid.org/0000-0001-8849-8808"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengkun Wei","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8849-8808","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tingke Wen","orcid":"https://orcid.org/0000-0002-3875-9915"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingke Wen","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-3875-9915","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049541905","display_name":"Qiangpu Chen","orcid":"https://orcid.org/0000-0001-7884-7998"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiangpu Chen","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0001-7884-7998","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-0601-4879"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-0601-4879","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haizhi Tang","orcid":"https://orcid.org/0009-0008-1802-3290"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haizhi Tang","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0009-0008-1802-3290","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006569051","display_name":"Zulie Pan","orcid":"https://orcid.org/0000-0001-5775-5824"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zulie Pan","raw_affiliation_strings":["College of Electronic Engineering, National University of Defense Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0001-5775-5824","affiliations":[{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Hefei, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40184691,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"52","issue":"1","first_page":"360","last_page":"375"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9614999890327454,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9581000208854675,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8661999702453613},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.595300018787384},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49790000915527344},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.47940000891685486},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46369999647140503},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3837999999523163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8862000107765198},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8661999702453613},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.595300018787384},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5200999975204468},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.47940000891685486},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46369999647140503},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4016999900341034},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3837999999523163},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3580000102519989},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.31349998712539673},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.29159998893737793},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2782000005245209},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2694000005722046}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tse.2025.3619966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3619966","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2510.15690","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.15690","pdf_url":"https://arxiv.org/pdf/2510.15690","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2510.15690","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.15690","pdf_url":"https://arxiv.org/pdf/2510.15690","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning":[1],"(DL)":[2],"frameworks":[3,20,51,63,193],"serve":[4],"as":[5],"the":[6,53,165,170],"backbone":[7],"for":[8,123,164],"a":[9,80,127,142],"wide":[10],"range":[11],"of":[12,174,226,238],"artificial":[13],"intelligence":[14],"applications.":[15],"However,":[16],"bugs":[17,41,108,180,233,240],"within":[18,126,148],"DL":[19,43,62,110,128,152,192],"can":[21],"cascade":[22],"into":[23],"critical":[24],"issues":[25],"in":[26,42,82,90,109,114,141],"higher-level":[27],"applications,":[28],"jeopardizing":[29],"reliability":[30],"and":[31,52,71,149,186,197,209,217,231],"security.":[32],"While":[33],"numerous":[34],"techniques":[35],"have":[36],"been":[37],"proposed":[38],"to":[39,76,87,105,130,161,177,212],"detect":[40],"frameworks,":[44],"research":[45],"exploring":[46],"common":[47],"API":[48,84,102,125,140,166],"patterns":[49],"across":[50,150,181],"potential":[54],"risks":[55],"they":[56],"entail":[57],"remains":[58],"limited.":[59],"Notably,":[60],"many":[61],"expose":[64],"similar":[65,146,175],"APIs":[66,89,147,176],"with":[67,145,236],"overlapping":[68],"input":[69],"parameters":[70],"functionalities,":[72],"rendering":[73],"them":[74],"vulnerable":[75],"shared":[77,107],"bugs,":[78,224],"where":[79],"flaw":[81],"one":[83],"may":[85],"extend":[86],"analogous":[88,179],"other":[91,151],"frameworks.":[92,111,153],"To":[93],"address":[94],"this":[95],"challenge,":[96],"we":[97],"propose":[98],"MirrorFuzz,":[99],"an":[100],"automated":[101],"fuzzing":[103],"solution":[104],"discover":[106],"MirrorFuzz":[112,118,185,203,221],"operates":[113],"three":[115],"stages:":[116],"First,":[117],"collects":[119],"historical":[120,171],"bug":[121,172],"data":[122,173],"each":[124,138],"framework":[129,144],"identify":[131],"potentially":[132],"buggy":[133,139],"APIs.":[134,182],"Second,":[135],"it":[136,155,188],"matches":[137],"specific":[143],"Third,":[154],"employs":[156],"large":[157],"language":[158],"models":[159],"(LLMs)":[160],"synthesize":[162],"code":[163,205],"under":[167],"test,":[168],"leveraging":[169],"trigger":[178],"We":[183],"implement":[184],"evaluate":[187],"on":[189,215],"four":[190],"popular":[191],"(TensorFlow,":[194],"PyTorch,":[195,218],"OneFlow,":[196],"Jittor).":[198],"Extensive":[199],"evaluation":[200],"demonstrates":[201],"that":[202],"improves":[204],"coverage":[206],"by":[207],"39.92%":[208],"98.20%":[210],"compared":[211],"state-of-the-art":[213],"methods":[214],"TensorFlow":[216],"respectively.":[219],"Moreover,":[220],"discovers":[222],"315":[223],"262":[225],"which":[227],"are":[228,234],"newly":[229],"found,":[230],"80":[232],"fixed,":[235],"52":[237],"these":[239],"assigned":[241],"CNVD":[242],"IDs.":[243]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-11T00:00:00"}
