{"id":"https://openalex.org/W3029312541","doi":"https://doi.org/10.1145/3395363.3397376","title":"Active fuzzing for testing and securing cyber-physical systems","display_name":"Active fuzzing for testing and securing cyber-physical systems","publication_year":2020,"publication_date":"2020-07-13","ids":{"openalex":"https://openalex.org/W3029312541","doi":"https://doi.org/10.1145/3395363.3397376","mag":"3029312541"},"language":"en","primary_location":{"id":"doi:10.1145/3395363.3397376","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395363.3397376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2005.14124","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yuqi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Yuqi Chen","raw_affiliation_strings":["Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bohan Xuan","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bohan Xuan","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Christopher M. Poskitt","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Christopher M. Poskitt","raw_affiliation_strings":["Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jun Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Sun","raw_affiliation_strings":["Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":null,"display_name":"Fan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]},{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Zhejiang University, China / Zhejiang Lab, China / Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China / Zhejiang Lab, China / Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692","https://openalex.org/I4210123185"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":2.5779,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90101237,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"14","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8830999732017517},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7633000016212463},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.599399983882904},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.44830000400543213},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.42809998989105225},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3621000051498413},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.3517000079154968},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.34049999713897705},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.31439998745918274}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8830999732017517},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7633000016212463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7088000178337097},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.599399983882904},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.44830000400543213},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.42809998989105225},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39730000495910645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3662000000476837},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.3517000079154968},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C2777632111","wikidata":"https://www.wikidata.org/wiki/Q1937518","display_name":"Reservation","level":2,"score":0.3140999972820282},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.29989999532699585},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.29910001158714294},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29089999198913574},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C161821725","wikidata":"https://www.wikidata.org/wiki/Q917415","display_name":"Regression testing","level":5,"score":0.27810001373291016},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.26809999346733093}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3395363.3397376","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3395363.3397376","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2005.14124","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.14124","pdf_url":"https://arxiv.org/pdf/2005.14124","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2005.14124","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.14124","pdf_url":"https://arxiv.org/pdf/2005.14124","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1546956568","https://openalex.org/W1559151285","https://openalex.org/W1678356000","https://openalex.org/W1993615002","https://openalex.org/W2034362794","https://openalex.org/W2038651258","https://openalex.org/W2049768769","https://openalex.org/W2052303336","https://openalex.org/W2056451850","https://openalex.org/W2096118443","https://openalex.org/W2127809819","https://openalex.org/W2161251616","https://openalex.org/W2176215692","https://openalex.org/W2279014940","https://openalex.org/W2399043755","https://openalex.org/W2418497778","https://openalex.org/W2494784360","https://openalex.org/W2509636684","https://openalex.org/W2511988939","https://openalex.org/W2535751405","https://openalex.org/W2570855918","https://openalex.org/W2577663800","https://openalex.org/W2583152362","https://openalex.org/W2583649498","https://openalex.org/W2608911009","https://openalex.org/W2727699974","https://openalex.org/W2742724057","https://openalex.org/W2755148105","https://openalex.org/W2772118689","https://openalex.org/W2774169481","https://openalex.org/W2782500360","https://openalex.org/W2798302610","https://openalex.org/W2805774329","https://openalex.org/W2806797541","https://openalex.org/W2890112720","https://openalex.org/W2891240227","https://openalex.org/W2891250288","https://openalex.org/W2896370767","https://openalex.org/W2896432382","https://openalex.org/W2897104255","https://openalex.org/W2908132907","https://openalex.org/W2947820052","https://openalex.org/W2963100367","https://openalex.org/W2963459078","https://openalex.org/W2963535556","https://openalex.org/W2990924520","https://openalex.org/W2998937823","https://openalex.org/W3002440596","https://openalex.org/W3004344782","https://openalex.org/W3047668054","https://openalex.org/W6684109919"],"related_works":[],"abstract_inverted_index":{"Cyber-physical":[0],"systems":[1],"(CPSs)":[2],"in":[3,87],"critical":[4],"infrastructure":[5],"face":[6],"a":[7,15,127,182,192],"pervasive":[8],"threat":[9],"from":[10,117],"attackers,":[11],"motivating":[12],"research":[13],"into":[14,141],"variety":[16],"of":[17,25,34,61,80,152,175,195],"countermeasures":[18,27,227],"for":[19,76,110,129,181],"securing":[20],"them.":[21,170],"Assessing":[22],"the":[23,47,102,139,150,159,173,211],"effectiveness":[24],"these":[26,123],"is":[28,43,149],"challenging,":[29],"however,":[30],"as":[31,226,231],"realistic":[32],"benchmarks":[33],"attacks":[35],"are":[36,165],"difficult":[37],"to":[38,46,125,137,146,167],"manually":[39],"construct,":[40],"blindly":[41],"testing":[42],"ineffective":[44],"due":[45],"enormous":[48],"search":[49,128],"spaces":[50],"and":[51,54,63,93,121,198,207,234],"resource":[52],"requirements,":[53],"intelligent":[55],"fuzzing":[56,177],"approaches":[57],"require":[58],"impractical":[59],"amounts":[60],"data":[62],"network":[64,83,119,208],"access.":[65],"In":[66],"this":[67],"work,":[68],"we":[69,216],"propose":[70],"active":[71,154,176],"fuzzing,":[72],"an":[73,142],"automatic":[74],"approach":[75,106],"finding":[77,187],"test":[78,193],"suites":[79],"packet-level":[81],"CPS":[82,140],"attacks,":[84,200],"targeting":[85],"scenarios":[86],"which":[88,156],"attackers":[89],"can":[90,189,222],"observe":[91],"sensors":[92],"manipulate":[94],"packets,":[95,120],"but":[96],"have":[97],"no":[98],"existing":[99],"knowledge":[100],"about":[101],"payload":[103,130],"encodings.":[104],"Our":[105],"learns":[107],"regression":[108],"models":[109,160,221],"predicting":[111],"sensor":[112],"values":[113],"that":[114,164,218],"will":[115],"result":[116],"sampled":[118],"uses":[122],"predictions":[124],"guide":[126],"manipulations":[131],"(i.e.":[132],"bit":[133],"flips)":[134],"most":[135,212],"likely":[136],"drive":[138],"unsafe":[143],"state.":[144],"Key":[145],"our":[147,219],"solution":[148],"use":[151],"online":[153],"learning,":[155],"iteratively":[157],"updates":[158],"by":[161,178],"sampling":[162],"payloads":[163],"estimated":[166],"maximally":[168],"improve":[169],"We":[171],"evaluate":[172],"efficacy":[174],"implementing":[179,229],"it":[180,188],"water":[183],"purification":[184],"plant":[185],"testbed,":[186],"automatically":[190],"discover":[191],"suite":[194],"flow,":[196],"pressure,":[197],"over/underflow":[199],"all":[201],"with":[202],"substantially":[203],"less":[204],"time,":[205],"data,":[206],"access":[209],"than":[210],"comparable":[213],"approach.":[214],"Finally,":[215],"demonstrate":[217],"prediction":[220],"also":[223],"be":[224],"utilised":[225],"themselves,":[228],"them":[230],"anomaly":[232],"detectors":[233],"early":[235],"warning":[236],"systems.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2020-06-05T00:00:00"}
