{"id":"https://openalex.org/W2766898821","doi":"https://doi.org/10.1145/3133956.3134085","title":"SemFuzz","display_name":"SemFuzz","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2766898821","doi":"https://doi.org/10.1145/3133956.3134085","mag":"2766898821"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3134085","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101927208","display_name":"Wei You","orcid":"https://orcid.org/0000-0003-1009-6627"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei You","raw_affiliation_strings":["Indiana University, Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108627615","display_name":"Peiyuan Zong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiyuan Zong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437976","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-5624-2987"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333259","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0003-0091-3865"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoFeng Wang","raw_affiliation_strings":["Indiana University, Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084889167","display_name":"Xiaojing Liao","orcid":"https://orcid.org/0000-0001-7555-1673"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]},{"id":"https://openalex.org/I267592682","display_name":"Williams (United States)","ror":"https://ror.org/007zhvp17","country_code":"US","type":"company","lineage":["https://openalex.org/I267592682"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojing Liao","raw_affiliation_strings":["William and Mary, Williamsburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"William and Mary, Williamsburg, VA, USA","institution_ids":["https://openalex.org/I16285277","https://openalex.org/I267592682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045485856","display_name":"Pan Bian","orcid":"https://orcid.org/0000-0003-0844-4805"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pan Bian","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100644627","display_name":"Bin Liang","orcid":"https://orcid.org/0000-0002-4818-7164"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liang","raw_affiliation_strings":["Renmin University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101927208"],"corresponding_institution_ids":["https://openalex.org/I4210119109"],"apc_list":null,"apc_paid":null,"fwci":5.4605,"has_fulltext":false,"cited_by_count":105,"citation_normalized_percentile":{"value":0.96622509,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2139","last_page":"2154"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9414325952529907},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8353270888328552},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6624628305435181},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.6432203054428101},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5602218508720398},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.5147090554237366},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.50790935754776},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.5004539489746094},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4575568437576294},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.275406152009964},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2059231698513031},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.13858091831207275}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9414325952529907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8353270888328552},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6624628305435181},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.6432203054428101},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5602218508720398},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.5147090554237366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.50790935754776},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.5004539489746094},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4575568437576294},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.275406152009964},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2059231698513031},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.13858091831207275},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3134085","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2190930083","display_name":null,"funder_award_id":"W911NF1610127","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G2658623934","display_name":null,"funder_award_id":"U1536106, 61728209, 91418206, 61170240, 61472429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W79696261","https://openalex.org/W1459231281","https://openalex.org/W1490011260","https://openalex.org/W1632114991","https://openalex.org/W1979823412","https://openalex.org/W1988524530","https://openalex.org/W1993516788","https://openalex.org/W2002934700","https://openalex.org/W2003315002","https://openalex.org/W2041174350","https://openalex.org/W2049736950","https://openalex.org/W2051990174","https://openalex.org/W2054520963","https://openalex.org/W2069268700","https://openalex.org/W2087115492","https://openalex.org/W2101512909","https://openalex.org/W2109612250","https://openalex.org/W2127637733","https://openalex.org/W2138788987","https://openalex.org/W2150656895","https://openalex.org/W2152874840","https://openalex.org/W2157353183","https://openalex.org/W2161204834","https://openalex.org/W2165597437","https://openalex.org/W2166336492","https://openalex.org/W2168649891","https://openalex.org/W2170196926","https://openalex.org/W2294903570","https://openalex.org/W2343954916","https://openalex.org/W2344257842","https://openalex.org/W2375939852","https://openalex.org/W2385474486","https://openalex.org/W2510008933","https://openalex.org/W2534610146","https://openalex.org/W2535617737","https://openalex.org/W2574017551","https://openalex.org/W2613534458","https://openalex.org/W2626301739","https://openalex.org/W2701225458","https://openalex.org/W4235354960","https://openalex.org/W4238983745","https://openalex.org/W4285719527","https://openalex.org/W6696803032"],"related_works":["https://openalex.org/W4306406268","https://openalex.org/W2007984522","https://openalex.org/W2886678613","https://openalex.org/W4385719733","https://openalex.org/W4213233191","https://openalex.org/W2297096600","https://openalex.org/W2982411552","https://openalex.org/W2123493477","https://openalex.org/W3085047896","https://openalex.org/W2518040442"],"abstract_inverted_index":{"Patches":[0],"and":[1],"related":[2],"information":[3,89,100],"about":[4],"software":[5],"vulnerabilities":[6,65,75],"are":[7,66,83],"often":[8,30],"made":[9],"available":[10],"to":[11,15,32,37,52],"the":[12,20,33,43,50,84],"public,":[13],"aiming":[14],"facilitate":[16,102],"timely":[17],"fixes.":[18],"Unfortunately,":[19],"slow":[21],"paces":[22],"of":[23,86,98],"system":[24],"updates":[25],"(30":[26],"days":[27],"on":[28,56,106],"average)":[29],"present":[31],"attackers":[34],"enough":[35],"time":[36],"recover":[38],"hidden":[39],"bugs":[40],"for":[41],"attacking":[42],"unpatched":[44],"systems.":[45],"Making":[46],"things":[47],"worse":[48],"is":[49],"potential":[51],"automatically":[53,114],"generate":[54],"exploits":[55],"input-validation":[57],"flaws":[58],"through":[59],"reverse-engineering":[60],"patches,":[61],"even":[62,105],"though":[63],"such":[64,99],"relatively":[67],"rare":[68],"(e.g.,":[69,90],"5%":[70],"among":[71],"all":[72],"Linux":[73],"kernel":[74],"in":[76,93],"last":[77],"few":[78],"years).":[79],"Less":[80],"understood,":[81],"however,":[82],"implications":[85],"other":[87,107],"bug-related":[88],"bug":[91],"descriptions":[92],"CVE),":[94],"particularly":[95],"whether":[96],"utilization":[97],"can":[101],"exploit":[103],"generation,":[104],"vulnerability":[108],"types":[109],"that":[110],"have":[111],"never":[112],"been":[113],"attacked.":[115]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":6}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2017-11-10T00:00:00"}
