{"id":"https://openalex.org/W2149801502","doi":"https://doi.org/10.1145/2557547.2557550","title":"KameleonFuzz","display_name":"KameleonFuzz","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2149801502","doi":"https://doi.org/10.1145/2557547.2557550","mag":"2149801502"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026246150","display_name":"Fabien Duch\u00eane","orcid":"https://orcid.org/0000-0002-8187-525X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fabien Duchene","raw_affiliation_strings":["Paris, France"],"affiliations":[{"raw_affiliation_string":"Paris, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033142771","display_name":"Sanjay Rawat","orcid":"https://orcid.org/0000-0003-0875-7924"},"institutions":[{"id":"https://openalex.org/I65181880","display_name":"Indian Institute of Technology Hyderabad","ror":"https://ror.org/01j4v3x97","country_code":"IN","type":"education","lineage":["https://openalex.org/I65181880"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjay Rawat","raw_affiliation_strings":["IIIT, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"IIIT, Hyderabad, India","institution_ids":["https://openalex.org/I65181880"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069318042","display_name":"Jean-Luc Richier","orcid":null},"institutions":[{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]},{"id":"https://openalex.org/I4210104430","display_name":"Laboratoire d'Informatique de Grenoble","ror":"https://ror.org/01c8rcg82","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210104430","https://openalex.org/I4210159245","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Richier","raw_affiliation_strings":["LIG Lab, Grenoble INP Ensimag, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"LIG Lab, Grenoble INP Ensimag, Grenoble, France","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430","https://openalex.org/I106785703"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059673708","display_name":"Roland Groz","orcid":"https://orcid.org/0000-0003-3730-8300"},"institutions":[{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]},{"id":"https://openalex.org/I4210104430","display_name":"Laboratoire d'Informatique de Grenoble","ror":"https://ror.org/01c8rcg82","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210104430","https://openalex.org/I4210159245","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Roland Groz","raw_affiliation_strings":["LIG Lab, Grenoble INP Ensimag, Grenoble, France"],"affiliations":[{"raw_affiliation_string":"LIG Lab, Grenoble INP Ensimag, Grenoble, France","institution_ids":["https://openalex.org/I899635006","https://openalex.org/I4210104430","https://openalex.org/I106785703"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026246150"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":17.9978,"has_fulltext":false,"cited_by_count":92,"citation_normalized_percentile":{"value":0.99016888,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9962877035140991},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6860761642456055},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5258862376213074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3444419503211975},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1880245804786682},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.0813751220703125}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9962877035140991},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6860761642456055},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5258862376213074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3444419503211975},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1880245804786682},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0813751220703125}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2557547.2557550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557550","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-00976132v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-00976132","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014, Unknown, pp.37-48, &#x27E8;10.1145/2557547.2557550&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/4a94e57f-af0f-41cd-8bd4-fe87abbe00fa","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/4a94e57f-af0f-41cd-8bd4-fe87abbe00fa","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Duchene, F, Rawat, S, Richier, J-L & Groz, R 2014, KameleonFuzz : evolutionary fuzzing for black-box XSS detection. in Proceedings of the 4th ACM Conference on Data and application security and privacy. Association for Computing Machinery, pp. 37-48. https://doi.org/10.1145/2557547.2557550","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322892","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W72335960","https://openalex.org/W80245043","https://openalex.org/W154245331","https://openalex.org/W234161625","https://openalex.org/W575818557","https://openalex.org/W1531203382","https://openalex.org/W1647671624","https://openalex.org/W1861561811","https://openalex.org/W1976299830","https://openalex.org/W1979931683","https://openalex.org/W1983801562","https://openalex.org/W1991074244","https://openalex.org/W2002447170","https://openalex.org/W2002934700","https://openalex.org/W2004007106","https://openalex.org/W2023451876","https://openalex.org/W2049214202","https://openalex.org/W2085168597","https://openalex.org/W2107510936","https://openalex.org/W2115914997","https://openalex.org/W2126247275","https://openalex.org/W2141497545","https://openalex.org/W2142223145","https://openalex.org/W2144696387","https://openalex.org/W2150326814","https://openalex.org/W2150566873","https://openalex.org/W2151305689","https://openalex.org/W2163362445","https://openalex.org/W2169868363","https://openalex.org/W2293458749","https://openalex.org/W2567327249","https://openalex.org/W2612312152","https://openalex.org/W2614031170","https://openalex.org/W6631721891"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W3203597304","https://openalex.org/W4248424560"],"abstract_inverted_index":{"Fuzz":[0],"testing":[1],"consists":[2],"in":[3,13],"automatically":[4],"generating":[5],"and":[6],"sending":[7],"malicious":[8],"inputs":[9],"to":[10,15,26,30,33],"an":[11],"application":[12],"order":[14],"hopefully":[16],"trigger":[17],"a":[18],"vulnerability.":[19],"Fuzzing":[20],"entails":[21],"such":[22],"questions":[23],"as:":[24],"Where":[25,32],"fuzz?":[27,31],"Which":[28],"parameter":[29],"observe":[34],"its":[35],"effects?":[36]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2016-06-24T00:00:00"}
