{"id":"https://openalex.org/W7126190070","doi":"https://doi.org/10.1109/raid67961.2025.00059","title":"H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion Anomalies","display_name":"H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion Anomalies","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W7126190070","doi":"https://doi.org/10.1109/raid67961.2025.00059"},"language":null,"primary_location":{"id":"doi:10.1109/raid67961.2025.00059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091946981","display_name":"Anthony Gavazzi","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anthony Gavazzi","raw_affiliation_strings":["Northeastern University,Boston,MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northeastern University,Boston,MA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124386233","display_name":"Weixin Kong","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weixin Kong","raw_affiliation_strings":["Northeastern University,Boston,MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northeastern University,Boston,MA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077875821","display_name":"Engin Kirda","orcid":"https://orcid.org/0000-0001-9988-6873"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Engin Kirda","raw_affiliation_strings":["Northeastern University,Boston,MA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northeastern University,Boston,MA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091946981"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80460477,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"920","last_page":"934"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.5996999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.5996999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.11699999868869781,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.0754999965429306,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9363999962806702},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6273999810218811},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5960000157356262},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5440000295639038},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4756999909877777}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9363999962806702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734000027179718},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6273999810218811},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5960000157356262},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5440000295639038},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4756999909877777},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.39559999108314514},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3903999924659729},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.3154999911785126},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28859999775886536},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27549999952316284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26460000872612},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/raid67961.2025.00059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2295974667","https://openalex.org/W2538556898","https://openalex.org/W2701082322","https://openalex.org/W2964241064","https://openalex.org/W2985708757","https://openalex.org/W2987467625","https://openalex.org/W3047947484","https://openalex.org/W3211708465","https://openalex.org/W4220830491","https://openalex.org/W4221162427","https://openalex.org/W4254697110","https://openalex.org/W4287849789","https://openalex.org/W4383223817","https://openalex.org/W4397028768","https://openalex.org/W4400121685","https://openalex.org/W4402957841"],"related_works":[],"abstract_inverted_index":{"HTTP/2":[0,44,64,119],"is":[1,20],"by":[2],"far":[3],"the":[4,26,38,46,50,55,96,99,103,144,171],"most":[5],"popular":[6],"HTTP":[7,12],"version,":[8],"yet":[9],"in":[10,22,69,143],"practice,":[11],"connections":[13],"rarely":[14,53],"occur":[15],"over":[16],"end-toend":[17],"HTTP/2.":[18],"This":[19],"due":[21],"large":[23],"part":[24],"to":[25,75,84,129,136],"fact":[27],"that":[28,162],"reverse":[29,134,153],"proxies":[30,135,154],"such":[31,89],"as":[32],"Content":[33],"Delivery":[34],"Networks":[35],"(CDNs)":[36],"between":[37,63],"client":[39,47],"and":[40,65,67,102,125,155,160],"server":[41,56],"universally":[42],"support":[43],"on":[45,54],"side":[48],"of":[49,98,105,133,150,174],"connection,":[51],"but":[52],"side.":[57],"Proxies":[58],"must":[59],"therefore":[60],"dynamically":[61],"convert":[62],"HTTP/1,":[66],"anomalies":[68,106,142,169],"this":[70],"conversion":[71,141,168],"process":[72],"can":[73,108],"lead":[74],"critical":[76],"vulnerabilities.":[77],"Prior":[78],"work":[79],"proposed":[80],"generational":[81],"fuzzing":[82],"techniques":[83],"discover":[85],"these":[86],"anomalies.":[87],"However,":[88],"an":[90],"approach":[91],"lacks":[92],"meaningful":[93],"feedback,":[94],"limiting":[95],"expressiveness":[97],"generated":[100],"requests":[101],"number":[104],"it":[107,163],"induce.":[109],"We,":[110],"therefore,":[111],"propose":[112],"H2Fuzz,":[113],"a":[114,122,131,148],"black-box":[115],"differential":[116],"fuzzer":[117],"for":[118],"which":[120,175],"uses":[121],"comprehensive":[123],"mutator":[124],"novel":[126],"feedback":[127],"system":[128],"drive":[130],"set":[132,149],"increasingly":[137],"divergent":[138],"behavior,":[139],"uncovering":[140],"process.":[145],"We":[146],"fuzz":[147],"11":[151],"standalone":[152],"5":[156],"CDNs":[157],"with":[158],"H2FUZZ,":[159],"find":[161],"induces":[164],"$50":[165],"\\%$":[166],"more":[167],"than":[170],"state-of-the-art,":[172],"many":[173],"have":[176],"immediate":[177],"security":[178],"implications.":[179]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-02-01T00:00:00"}
