{"id":"https://openalex.org/W4200578649","doi":"https://doi.org/10.1145/3487075.3487124","title":"HDBFuzzer\u2013Target-oriented Hybrid Directed Binary Fuzzer","display_name":"HDBFuzzer\u2013Target-oriented Hybrid Directed Binary Fuzzer","publication_year":2021,"publication_date":"2021-10-19","ids":{"openalex":"https://openalex.org/W4200578649","doi":"https://doi.org/10.1145/3487075.3487124"},"language":"en","primary_location":{"id":"doi:10.1145/3487075.3487124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3487075.3487124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101715004","display_name":"Yingchao Yu","orcid":"https://orcid.org/0000-0003-3786-1253"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yingchao Yu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055002547","display_name":"Xiao-Jun Qin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaojun Qin","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079029036","display_name":"Shuitao Gan","orcid":"https://orcid.org/0000-0002-6083-9049"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuitao Gan","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101715004"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3017,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64482664,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"34","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.6965861320495605},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6708132028579712},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.538518488407135},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3216297924518585},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1539422869682312},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11157813668251038},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.11089706420898438}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.6965861320495605},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6708132028579712},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.538518488407135},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3216297924518585},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1539422869682312},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11157813668251038},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.11089706420898438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3487075.3487124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3487075.3487124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W3108903408","https://openalex.org/W4312309247","https://openalex.org/W6600212061"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W3203597304","https://openalex.org/W4248424560"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,80],"propose":[4,81],"a":[5,82],"target-oriented":[6],"hybrid":[7],"directed":[8,34,47,51,118],"binary":[9,20,148],"fuzzer":[10],"(HDBFuzzer)":[11],"to":[12,53,63,73,141,172],"solve":[13],"the":[14,50,68,75,92,96,104,109,114,117,129,136,139,143,147,165,177],"vulnerability":[15,144],"confirmation":[16],"problem":[17],"based":[18,86],"on":[19,87,157,176],"code":[21,131],"similarity":[22],"comparison.":[23],"HDBFuzzer":[24,121,152,169],"combines":[25],"macro":[26],"function":[27],"level":[28],"direction":[29],"fuzzing":[30,52],"and":[31,99,133,155,160,164,174,182],"micro":[32],"path-constraint":[33],"solving.":[35],"For":[36],"some":[37,57],"branches":[38],"with":[39],"simple":[40],"or":[41],"loose":[42],"constraints,":[43,60],"it":[44,61],"still":[45],"uses":[46],"mutation":[48],"of":[49,77],"penetrate":[54],"while":[55],"for":[56],"really":[58],"hard-to-penetrate":[59],"resorts":[62],"guided":[64],"concolic":[65],"execution.":[66],"At":[67],"same":[69],"time,":[70],"in":[71,146],"order":[72],"improve":[74],"efficiency":[76],"constraint":[78,83],"solving,":[79],"solving":[84],"method":[85,107],"\u201cpath":[88],"abstraction\u201d,":[89],"which":[90],"approximates":[91],"solution":[93],"space":[94],"by":[95,116],"linear":[97,110],"expression":[98],"generates":[100],"effective":[101],"input":[102,124],"utilizing":[103],"highly-effective":[105],"sampling":[106],"towards":[108],"space.":[111],"Then,":[112],"under":[113,138],"guidance":[115],"greybox":[119],"fuzzing,":[120],"can":[122,126],"generate":[123],"that":[125,168],"quickly":[127],"reach":[128],"vulnerable":[130],"region":[132],"finally":[134],"crash":[135],"program":[137],"test":[140],"confirm":[142],"hidden":[145],"program.":[149],"We":[150],"evaluate":[151],"against":[153],"AFLGo-B":[154,173],"QSYM":[156,175],"LAVA-M":[158],"dataset":[159],"ten":[161],"real-world":[162],"programs,":[163],"results":[166],"show":[167],"is":[170],"superior":[171],"bug":[178,180],"discovery,":[179],"reproduction":[181],"target":[183],"reaching":[184],"capabilities.":[185]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
