{"id":"https://openalex.org/W4384155568","doi":"https://doi.org/10.1145/3597926.3598102","title":"1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing","display_name":"1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing","publication_year":2023,"publication_date":"2023-07-12","ids":{"openalex":"https://openalex.org/W4384155568","doi":"https://doi.org/10.1145/3597926.3598102"},"language":"en","primary_location":{"id":"doi:10.1145/3597926.3598102","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598102","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3597926.3598102","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081995361","display_name":"Songtao Yang","orcid":"https://orcid.org/0000-0001-5903-8554"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Songtao Yang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021695620","display_name":"Yubo He","orcid":"https://orcid.org/0000-0003-2341-9608"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yubo He","raw_affiliation_strings":["Information Engineering University, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054849720","display_name":"Kaixiang Chen","orcid":"https://orcid.org/0000-0001-6093-951X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaixiang Chen","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051740371","display_name":"Zheyu Ma","orcid":"https://orcid.org/0000-0002-0710-326X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheyu Ma","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100881859","display_name":"Yong Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Xie","raw_affiliation_strings":["Qinghai University, China"],"affiliations":[{"raw_affiliation_string":"Qinghai University, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026227164","display_name":"Jianjun Chen","orcid":"https://orcid.org/0000-0003-4730-7803"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianjun Chen","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100460120","display_name":"Chao Zhang","orcid":"https://orcid.org/0000-0001-9881-5643"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zhang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5081995361"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.9216,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.92012365,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"867","last_page":"879"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9672808647155762},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7623358964920044},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6844873428344727},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.546970009803772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5377761125564575},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5217729210853577},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4754611849784851},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.40967094898223877},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.27742308378219604},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.08485153317451477},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06794875860214233}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9672808647155762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7623358964920044},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6844873428344727},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.546970009803772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5377761125564575},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5217729210853577},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4754611849784851},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.40967094898223877},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.27742308378219604},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.08485153317451477},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06794875860214233},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3597926.3598102","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598102","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3597926.3598102","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3597926.3598102","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1842301749","display_name":null,"funder_award_id":"62272265","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2834970340","display_name":null,"funder_award_id":"61972224, 62272265","funder_id":"https://openalex.org/F4320334062","funder_display_name":"National Natural Science Foundation of China-Liaoning Joint Fund"},{"id":"https://openalex.org/G2873699935","display_name":null,"funder_award_id":"2021YFB2701000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4302849700","display_name":null,"funder_award_id":"2021YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5777954143","display_name":null,"funder_award_id":"61972224","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7422924211","display_name":null,"funder_award_id":"BNR2022RC01006","funder_id":"https://openalex.org/F4320329777","funder_display_name":"Beijing National Research Center For Information Science And Technology"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329777","display_name":"Beijing National Research Center For Information Science And Technology","ror":null},{"id":"https://openalex.org/F4320334062","display_name":"National Natural Science Foundation of China-Liaoning Joint Fund","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W116894366","https://openalex.org/W1690253345","https://openalex.org/W1963739845","https://openalex.org/W2009614414","https://openalex.org/W2025819261","https://openalex.org/W2084201645","https://openalex.org/W2165597437","https://openalex.org/W2414803796","https://openalex.org/W2514974017","https://openalex.org/W2535617737","https://openalex.org/W2701082322","https://openalex.org/W2749008552","https://openalex.org/W2757104921","https://openalex.org/W2766540688","https://openalex.org/W2766898821","https://openalex.org/W2768013588","https://openalex.org/W2794670092","https://openalex.org/W2888320512","https://openalex.org/W2891235722","https://openalex.org/W2898829570","https://openalex.org/W2926178846","https://openalex.org/W2964097210","https://openalex.org/W2969343988","https://openalex.org/W2969597118","https://openalex.org/W3007413911","https://openalex.org/W3081194266","https://openalex.org/W3082737479","https://openalex.org/W3093824853","https://openalex.org/W3104664063","https://openalex.org/W3105926539","https://openalex.org/W3107604447","https://openalex.org/W3109094705","https://openalex.org/W3141872514","https://openalex.org/W3162301386","https://openalex.org/W3211608049","https://openalex.org/W4240590466","https://openalex.org/W4285586654","https://openalex.org/W4288057792","https://openalex.org/W4293307385"],"related_works":["https://openalex.org/W2352737138","https://openalex.org/W2062583373","https://openalex.org/W2120675930","https://openalex.org/W4385719733","https://openalex.org/W3085047896","https://openalex.org/W2123016006","https://openalex.org/W2979496624","https://openalex.org/W114061091","https://openalex.org/W2297096600","https://openalex.org/W3183415891"],"abstract_inverted_index":{"1-day":[0,28,41,54,101,143,179],"vulnerabilities":[1,29,55,102,144,158,180],"are":[2],"common":[3,77],"in":[4,103,159],"practice":[5],"and":[6,24,52,78,89,133,172],"have":[7,148],"posed":[8],"severe":[9],"threats":[10],"to":[11,21,36,98,117,139,176],"end":[12],"users,":[13],"as":[14],"adversaries":[15],"could":[16,173],"learn":[17],"from":[18],"released":[19],"patches":[20,82],"find":[22,118,174],"them":[23],"exploit":[25],"them.":[26],"Reproducing":[27],"is":[30,56,58,83],"also":[31],"crucial":[32],"for":[33,130,142],"defenders,":[34],"e.g.,":[35],"block":[37],"attack":[38],"traffic":[39],"against":[40],"vulnerabilities.":[42],"A":[43],"core":[44],"question":[45],"that":[46,75,165],"affects":[47],"the":[48,59,84,108],"effectiveness":[49],"of":[50,62,81,155],"recognizing":[51],"triggering":[53],"what":[57],"unique":[60,79],"feature":[61,80],"a":[63,68,76,91,113,125,134,153,182],"security":[64],"patch.":[65],"After":[66],"conducting":[67],"large-scale":[69],"empirical":[70],"study,":[71],"we":[72,111],"point":[73],"out":[74],"trailing":[85],"call":[86],"sequence":[87],"(TCS)":[88],"present":[90,112],"novel":[92,126,135],"directed":[93,131],"differential":[94],"fuzzing":[95],"solution":[96],"1dFuzz":[97,151,166],"efficiently":[99],"reproduce":[100],"this":[104],"paper.":[105],"Based":[106],"on":[107,152],"TCS":[109],"feature,":[110],"locator":[114],"1dLoc":[115],"able":[116,138],"candidate":[119],"patch":[120],"locations":[121],"via":[122],"static":[123],"analysis,":[124],"TCS-based":[127],"distance":[128],"metric":[129],"fuzzing,":[132],"sanitizer":[136],"1dSan":[137],"catch":[140],"PoCs":[141],"during":[145],"fuzzing.":[146],"We":[147],"systematically":[149],"evaluated":[150],"set":[154],"real-world":[156],"software":[157],"11":[160],"different":[161],"settings.":[162],"Results":[163],"show":[164],"significantly":[167],"outperforms":[168],"state-of-the-art":[169],"(SOTA)":[170],"baselines":[171],"up":[175],"2.26x":[177],"more":[178],"with":[181],"43%":[183],"shorter":[184],"time.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
