{"id":"https://openalex.org/W4285410106","doi":"https://doi.org/10.1145/3532213.3532221","title":"NNSMT: Deep Neural Networks for SMT Solvers Fuzzing","display_name":"NNSMT: Deep Neural Networks for SMT Solvers Fuzzing","publication_year":2022,"publication_date":"2022-03-18","ids":{"openalex":"https://openalex.org/W4285410106","doi":"https://doi.org/10.1145/3532213.3532221"},"language":"en","primary_location":{"id":"doi:10.1145/3532213.3532221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532213.3532221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Computing and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102458287","display_name":"Zifu Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zifu Yan","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424209","display_name":"Yongjun Wang","orcid":"https://orcid.org/0000-0002-3627-1465"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjun Wang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073352990","display_name":"Haoran Xu","orcid":"https://orcid.org/0009-0005-4190-5257"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoran Xu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102458287"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.2639,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54736152,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.978405237197876},{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability modulo theories","score":0.9071816205978394},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8990840315818787},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.5693053007125854},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.5665425062179565},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5607967376708984},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.47624921798706055},{"id":"https://openalex.org/keywords/concolic-testing","display_name":"Concolic testing","score":0.4340229332447052},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.38087591528892517},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12906122207641602}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.978405237197876},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.9071816205978394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8990840315818787},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.5693053007125854},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.5665425062179565},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5607967376708984},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47624921798706055},{"id":"https://openalex.org/C11219265","wikidata":"https://www.wikidata.org/wiki/Q5158734","display_name":"Concolic testing","level":4,"score":0.4340229332447052},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.38087591528892517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12906122207641602}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3532213.3532221","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532213.3532221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Computing and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W604964566","https://openalex.org/W1550560956","https://openalex.org/W1805937750","https://openalex.org/W1968936553","https://openalex.org/W1994573369","https://openalex.org/W2017609955","https://openalex.org/W2019404692","https://openalex.org/W2023035194","https://openalex.org/W2057086403","https://openalex.org/W2148190602","https://openalex.org/W2344444819","https://openalex.org/W2561272480","https://openalex.org/W2583649498","https://openalex.org/W2808279976","https://openalex.org/W2949558051","https://openalex.org/W2996696082","https://openalex.org/W2998273948","https://openalex.org/W3090416608"],"related_works":["https://openalex.org/W2777046235","https://openalex.org/W3019261932","https://openalex.org/W1992485833","https://openalex.org/W2186070848","https://openalex.org/W2914996832","https://openalex.org/W49527103","https://openalex.org/W2785720764","https://openalex.org/W2184716478","https://openalex.org/W3172606155","https://openalex.org/W3161338937"],"abstract_inverted_index":{"SMT":[0,63,68,141,154,175,201,216],"solvers":[1,39,69,217],"are":[2,71,236],"important":[3],"tools":[4],"in":[5,21,62],"the":[6,17,66,79,101,106,115,132,166,173,179,196,212],"field":[7],"of":[8,19,117,126,148,172,181,200,215,230,234],"software":[9,26],"engineering,":[10],"which":[11,235],"is":[12,51,207],"often":[13],"used":[14],"to":[15,35,46,55,104,121,135,151,164],"determine":[16],"satisfiability":[18],"formulas":[20],"formal":[22],"methods,":[23],"such":[24],"as":[25],"verification,":[27,31],"program":[28,30,150],"synthesis,":[29],"etc.":[32],"However,":[33],"due":[34],"their":[36],"complex":[37,80],"implementations,":[38],"may":[40],"contain":[41],"critical":[42],"bugs":[43,229],"that":[44,195],"lead":[45],"unsound":[47],"results.":[48],"Fuzz":[49],"testing":[50],"an":[52,111],"effective":[53],"method":[54],"detect":[56],"new":[57,185],"errors":[58],"or":[59],"security":[60],"vulnerabilities":[61],"solvers,":[64],"but":[65],"existing":[67],"fuzzing":[70,95],"not":[72],"scalable":[73],"enough":[74],"and":[75,109,137,169,188,211],"too":[76],"dependent":[77],"on":[78],"grammar":[81],"rules":[82],"provided":[83],"by":[84,205,240],"human":[85],"beings.":[86],"To":[87],"tackle":[88],"this":[89,146],"challenge,":[90],"we":[91,177,226],"propose":[92],"a":[93,123,160],"grammar-based":[94],"tool":[96],"called":[97],"NNSMT.":[98],"NNSMT":[99,182,206],"uses":[100,131],"attention":[102],"mechanism":[103],"capture":[105],"long-distance":[107,119],"dependencies,":[108],"adopts":[110],"encoder-decoder":[112],"architecture":[113],"with":[114],"embedding":[116],"these":[118],"dependencies":[120],"build":[122],"language":[124,133],"model":[125,134],"regular":[127],"programs.":[128,143],"Moreover,":[129],"it":[130],"automatically":[136],"continuously":[138],"generates":[139],"well-formed":[140],"test":[142,202],"We":[144,158],"use":[145],"set":[147],"generated":[149,174,204],"fuzz":[152],"off-the-shelf":[153],"solvers(e.g.,":[155],"Z3,":[156],"CVC4).":[157],"present":[159],"detailed":[161],"case":[162],"study":[163],"analyze":[165,178],"pass":[167,198],"rate":[168,199],"coverage":[170,214],"improvement":[171],"program.":[176],"performance":[180],"under":[183],"five":[184],"generation":[186],"strategies":[187],"two":[189],"sampling":[190],"methods.":[191],"Extensive":[192],"experiments":[193],"show":[194],"average":[197],"programs":[203],"more":[208],"than":[209],"85%,":[210],"code":[213],"has":[218],"been":[219],"significantly":[220],"improved.":[221],"In":[222],"our":[223],"preliminary":[224],"study,":[225],"found":[227],"3":[228],"Z3":[231],"solver,":[232],"all":[233],"actively":[237],"being":[238],"addressed":[239],"developers.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
