{"id":"https://openalex.org/W4311166005","doi":"https://doi.org/10.1145/3564625.3564660","title":"Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing","display_name":"Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4311166005","doi":"https://doi.org/10.1145/3564625.3564660"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3564660","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013595393","display_name":"Yiru Zhao","orcid":"https://orcid.org/0000-0002-1896-2131"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiru Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052684735","display_name":"Xiaoke Wang","orcid":"https://orcid.org/0000-0003-1066-791X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoke Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100671319","display_name":"Lei Zhao","orcid":"https://orcid.org/0000-0003-2412-7279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047799795","display_name":"Yueqiang Cheng","orcid":"https://orcid.org/0000-0002-6277-340X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yueqiang Cheng","raw_affiliation_strings":["NIO Security Research, USA"],"affiliations":[{"raw_affiliation_string":"NIO Security Research, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073376805","display_name":"Heng Yin","orcid":"https://orcid.org/0000-0002-8942-7742"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Heng Yin","raw_affiliation_strings":["Department of Computer Science &amp; Engineering, UC Riverside, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Engineering, UC Riverside, USA","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013595393"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":3.3023,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.92364991,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"534","last_page":"547"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11574","display_name":"Artificial Intelligence in Games","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9819281697273254},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6863681674003601},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5101854801177979},{"id":"https://openalex.org/keywords/monte-carlo-tree-search","display_name":"Monte Carlo tree search","score":0.509994626045227},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.5041381120681763},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.20371094346046448},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19566673040390015},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.12620115280151367},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07521665096282959},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06829676032066345}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9819281697273254},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6863681674003601},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5101854801177979},{"id":"https://openalex.org/C46149586","wikidata":"https://www.wikidata.org/wiki/Q11785332","display_name":"Monte Carlo tree search","level":3,"score":0.509994626045227},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.5041381120681763},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.20371094346046448},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19566673040390015},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.12620115280151367},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07521665096282959},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06829676032066345}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3564625.3564660","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W124447425","https://openalex.org/W2126316555","https://openalex.org/W2137530017","https://openalex.org/W2591037921","https://openalex.org/W2605116034","https://openalex.org/W2736267156","https://openalex.org/W2757104921","https://openalex.org/W2766647240","https://openalex.org/W2777430404","https://openalex.org/W2811397117","https://openalex.org/W2909134974","https://openalex.org/W2963846926","https://openalex.org/W2964097210","https://openalex.org/W2964241064","https://openalex.org/W3011232183","https://openalex.org/W3042246525","https://openalex.org/W3094083700","https://openalex.org/W3101845936","https://openalex.org/W3104664063","https://openalex.org/W4289038676"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W3023977444","https://openalex.org/W2766647240","https://openalex.org/W4210660460"],"abstract_inverted_index":{"Coverage-based":[0],"greybox":[1],"fuzzing":[2,32],"(CGF)":[3],"has":[4],"been":[5,46],"approved":[6],"to":[7],"be":[8],"effective":[9],"in":[10,38],"finding":[11],"security":[12],"vulnerabilities.":[13],"Seed":[14],"scheduling,":[15],"the":[16,23,26,30,60],"process":[17],"of":[18,49],"selecting":[19],"an":[20],"input":[21],"as":[22],"seed":[24,27,42],"from":[25],"pool":[28],"for":[29],"next":[31],"iteration,":[33],"plays":[34],"a":[35],"central":[36],"role":[37],"CGF.":[39],"Although":[40],"numerous":[41],"scheduling":[43],"strategies":[44],"have":[45],"proposed,":[47],"most":[48],"them":[50],"treat":[51],"these":[52],"seeds":[53],"independently":[54],"and":[55],"do":[56],"not":[57],"explicitly":[58],"consider":[59],"relationships":[61],"among":[62],"seeds.":[63]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
