{"id":"https://openalex.org/W4313547603","doi":"https://doi.org/10.1145/3551349.3559550","title":"A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity","display_name":"A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4313547603","doi":"https://doi.org/10.1145/3551349.3559550"},"language":"en","primary_location":{"id":"doi:10.1145/3551349.3559550","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559550","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559550","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559550","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063671391","display_name":"Jinfu Chen","orcid":"https://orcid.org/0000-0002-3124-5452"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006922887","display_name":"Shengran Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengran Wang","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090272207","display_name":"Saihua Cai","orcid":"https://orcid.org/0000-0003-0743-1156"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saihua Cai","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458183","display_name":"Chi Zhang","orcid":"https://orcid.org/0000-0002-5237-8916"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Zhang","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406215","display_name":"Haibo Chen","orcid":"https://orcid.org/0000-0002-9720-0361"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Chen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350605","display_name":"Jingyi Chen","orcid":"https://orcid.org/0000-0003-2668-6592"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyi Chen","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100427565","display_name":"Jianming Zhang","orcid":"https://orcid.org/0000-0002-4278-0805"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianming Zhang","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5063671391"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":0.2648,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58931498,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9492831230163574},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8297240138053894},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.6492772102355957},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6135592460632324},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.6022047996520996},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.48210835456848145},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44449201226234436},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.43926480412483215},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4336237907409668},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.40892547369003296},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3782801032066345},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2382308840751648},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19531050324440002},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15354543924331665},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.11416319012641907},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10682091116905212}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9492831230163574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8297240138053894},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.6492772102355957},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6135592460632324},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.6022047996520996},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.48210835456848145},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44449201226234436},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.43926480412483215},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4336237907409668},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.40892547369003296},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3782801032066345},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2382308840751648},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19531050324440002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15354543924331665},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.11416319012641907},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10682091116905212}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3551349.3559550","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559550","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559550","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3551349.3559550","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3559550","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3559550","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313547603.pdf","grobid_xml":"https://content.openalex.org/works/W4313547603.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2128985333","https://openalex.org/W2294434616","https://openalex.org/W2741068848","https://openalex.org/W2777430404","https://openalex.org/W2969901236","https://openalex.org/W2985896598","https://openalex.org/W3019428952","https://openalex.org/W4236606190"],"related_works":["https://openalex.org/W4313066017","https://openalex.org/W4283736421","https://openalex.org/W4381785649","https://openalex.org/W2297949281","https://openalex.org/W1964740600","https://openalex.org/W2884946294","https://openalex.org/W3133364053","https://openalex.org/W2991920445","https://openalex.org/W2914996832","https://openalex.org/W3091033583"],"abstract_inverted_index":{"Coverage-guided":[0],"Greybox":[1],"fuzzing":[2,107],"is":[3,26,65,89,135],"regarded":[4],"as":[5,19,21,181,183],"a":[6,105,158],"practical":[7],"approach":[8,176],"to":[9,15,27,31,71,77,92,114,136],"detect":[10],"software":[11],"vulnerabilities,":[12],"which":[13,34,109,139],"targets":[14],"expand":[16],"code":[17,60,74,79,87,112,145],"coverage":[18,186],"much":[20],"possible.":[22],"A":[23],"common":[24],"implementation":[25],"assign":[28],"more":[29,90,94,141,179],"energy":[30],"such":[32],"seeds":[33],"find":[35,93],"new":[36,45],"edges":[37,46],"with":[38,80,85,146],"less":[39,49],"execution":[40],"time.":[41],"However,":[42],"solely":[43],"considering":[44],"may":[47],"be":[48],"effective":[50],"because":[51],"some":[52],"hard-to-find":[53],"branches":[54,95],"often":[55],"exist":[56],"in":[57,119],"the":[58,68,73,78,83,144,150,169,174,185],"complex":[59],"of":[61,67,132,149],"program.":[62],"Code":[63],"complexity":[64,88,113,148],"one":[66],"key":[69],"indicators":[70],"measure":[72],"security.":[75],"Compared":[76],"simple":[81],"structure,":[82],"program":[84,151],"higher":[86,147],"likely":[91],"and":[96,124,168],"cause":[97],"security":[98],"problems.":[99],"In":[100,154],"this":[101],"paper,":[102],"we":[103,156],"propose":[104],"novel":[106],"method":[108,134],"further":[110],"uses":[111],"optimize":[115],"power":[116],"schedule":[117],"process":[118],"AFL":[120],"(American":[121,126],"Fuzzy":[122,127],"Lop)":[123],"AFLFAST":[125],"Lop":[128],"Fast).":[129],"The":[130],"goal":[131],"our":[133],"generate":[137],"inputs":[138],"are":[140],"biased":[142],"toward":[143],"under":[152,162],"test.":[153],"addition,":[155],"conduct":[157],"preliminary":[159],"empirical":[160],"study":[161],"three":[163],"widely":[164],"used":[165],"real-world":[166],"programs,":[167],"experimental":[170],"results":[171],"show":[172],"that":[173],"proposed":[175],"can":[177],"trigger":[178],"crashes":[180],"well":[182],"improve":[184],"discovery.":[187]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
