{"id":"https://openalex.org/W4200404894","doi":"https://doi.org/10.1145/3487075.3487107","title":"Research on Fuzzing Technology for JavaScript Engines","display_name":"Research on Fuzzing Technology for JavaScript Engines","publication_year":2021,"publication_date":"2021-10-19","ids":{"openalex":"https://openalex.org/W4200404894","doi":"https://doi.org/10.1145/3487075.3487107"},"language":"en","primary_location":{"id":"doi:10.1145/3487075.3487107","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3487075.3487107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089331963","display_name":"Ye Tian","orcid":"https://orcid.org/0000-0002-0981-6677"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ye Tian","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China and State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China and State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031841670","display_name":"Xiaojun Qin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaojun Qin","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079029036","display_name":"Shuitao Gan","orcid":"https://orcid.org/0000-0002-6083-9049"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuitao Gan","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089331963"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6033,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71826372,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9781726598739624},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.8568358421325684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7733244895935059},{"id":"https://openalex.org/keywords/unobtrusive-javascript","display_name":"Unobtrusive JavaScript","score":0.6987336874008179},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4539678692817688},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4524593949317932},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.45184752345085144},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36087697744369507},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.34492576122283936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31507086753845215},{"id":"https://openalex.org/keywords/rich-internet-application","display_name":"Rich Internet application","score":0.26804572343826294},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.25129586458206177},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16277161240577698},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15782606601715088}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9781726598739624},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.8568358421325684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7733244895935059},{"id":"https://openalex.org/C198240166","wikidata":"https://www.wikidata.org/wiki/Q2298909","display_name":"Unobtrusive JavaScript","level":4,"score":0.6987336874008179},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4539678692817688},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4524593949317932},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.45184752345085144},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36087697744369507},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.34492576122283936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31507086753845215},{"id":"https://openalex.org/C103048170","wikidata":"https://www.wikidata.org/wiki/Q725485","display_name":"Rich Internet application","level":3,"score":0.26804572343826294},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.25129586458206177},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16277161240577698},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15782606601715088},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3487075.3487107","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3487075.3487107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2002934700","https://openalex.org/W2016716561","https://openalex.org/W2018951244","https://openalex.org/W2029329147","https://openalex.org/W2042033151","https://openalex.org/W2094873755","https://openalex.org/W2101512909","https://openalex.org/W2519952770","https://openalex.org/W2535617737","https://openalex.org/W2538286173","https://openalex.org/W2584230735","https://openalex.org/W2612286231","https://openalex.org/W2654868256","https://openalex.org/W2701225458","https://openalex.org/W2766540688","https://openalex.org/W2794670092","https://openalex.org/W2899781671","https://openalex.org/W2928702109","https://openalex.org/W2947109320","https://openalex.org/W2963350015","https://openalex.org/W2963674831","https://openalex.org/W2963723316","https://openalex.org/W2979357014","https://openalex.org/W2998205945","https://openalex.org/W3015193297","https://openalex.org/W3154106427"],"related_works":["https://openalex.org/W1529857345","https://openalex.org/W1428729482","https://openalex.org/W2565381658","https://openalex.org/W2225555018","https://openalex.org/W3005439998","https://openalex.org/W2129596343","https://openalex.org/W2614015876","https://openalex.org/W2475037646","https://openalex.org/W1995714055","https://openalex.org/W2487497196"],"abstract_inverted_index":{"JavaScript":[0,40,67,78,108],"engine":[1],"is":[2,43],"the":[3,15,19,61,83,90,104],"core":[4,91],"component":[5],"of":[6,14,18,54,66,77,107],"web":[7],"browsers,":[8],"whose":[9],"security":[10,45],"issues":[11,92],"are":[12],"one":[13],"critical":[16],"aspects":[17],"overall":[20],"Web":[21],"Eco-Security.":[22],"Fuzzing":[23,69,80],"technology,":[24],"as":[25],"an":[26,101],"efficient":[27],"software":[28],"testing":[29],"approach,":[30],"has":[31],"been":[32],"widely":[33],"applied":[34],"to":[35],"detecting":[36],"vulnerabilities":[37],"in":[38,96],"different":[39],"engines,":[41],"which":[42],"a":[44,74],"research":[46,98],"hotspot":[47],"at":[48],"present.":[49],"Based":[50],"on":[51,103],"systematical":[52],"dissection":[53],"existing":[55],"fuzzing":[56],"methods,":[57],"this":[58],"paper":[59],"reviews":[60],"development":[62],"and":[63,81,99],"technical":[64],"ideas":[65],"Engine":[68,79,109],"combined":[70],"with":[71],"taxonomy,":[72],"proposes":[73],"general":[75],"framework":[76],"analyzes":[82],"key":[84],"techniques":[85],"involved.":[86],"Finally,":[87],"we":[88],"discuss":[89],"that":[93],"restrict":[94],"efficiency":[95],"current":[97],"present":[100],"outlook":[102],"future":[105],"trends":[106],"Fuzzing.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
