{"id":"https://openalex.org/W4402955231","doi":"https://doi.org/10.1145/3658644.3690209","title":"DarthShader: Fuzzing WebGPU Shader Translators &amp; Compilers","display_name":"DarthShader: Fuzzing WebGPU Shader Translators &amp; Compilers","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4402955231","doi":"https://doi.org/10.1145/3658644.3690209"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690209","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690209","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690209","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690209","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058085387","display_name":"Lukas Bernhard","orcid":"https://orcid.org/0009-0005-8564-1476"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lukas Bernhard","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081483595","display_name":"Nico Schiller","orcid":"https://orcid.org/0009-0004-6401-5989"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nico Schiller","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069446947","display_name":"Moritz Schloegel","orcid":"https://orcid.org/0000-0003-1630-1687"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Moritz Schloegel","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053788383","display_name":"Nils Bars","orcid":"https://orcid.org/0009-0001-5179-4002"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nils Bars","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056790702","display_name":"Thorsten Holz","orcid":"https://orcid.org/0000-0002-2783-1264"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thorsten Holz","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058085387"],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":1.4329,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84577114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"690","last_page":"704"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8860295414924622},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7566800713539124},{"id":"https://openalex.org/keywords/shader","display_name":"Shader","score":0.7541328072547913},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7331621646881104},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6251178979873657},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.30555665493011475},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11177399754524231},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.1069703996181488}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8860295414924622},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7566800713539124},{"id":"https://openalex.org/C177681979","wikidata":"https://www.wikidata.org/wiki/Q633182","display_name":"Shader","level":3,"score":0.7541328072547913},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7331621646881104},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6251178979873657},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.30555665493011475},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11177399754524231},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.1069703996181488}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3658644.3690209","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690209","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690209","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2409.01824","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.01824","pdf_url":"https://arxiv.org/pdf/2409.01824","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690209","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690209","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690209","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2208967777","display_name":null,"funder_award_id":"101045669","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402955231.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W64156013","https://openalex.org/W1976878954","https://openalex.org/W2153185479","https://openalex.org/W2169768162","https://openalex.org/W2170737051","https://openalex.org/W2324595780","https://openalex.org/W2350778671","https://openalex.org/W2367183013","https://openalex.org/W2519952770","https://openalex.org/W2535617737","https://openalex.org/W2625141509","https://openalex.org/W2759550170","https://openalex.org/W2947109320","https://openalex.org/W2947182139","https://openalex.org/W3008797115","https://openalex.org/W3015193297","https://openalex.org/W3017716388","https://openalex.org/W3110161860","https://openalex.org/W3136690412","https://openalex.org/W3139023885","https://openalex.org/W3154121988","https://openalex.org/W3180202404","https://openalex.org/W3197190431","https://openalex.org/W4238083723","https://openalex.org/W4308643070","https://openalex.org/W4378418587","https://openalex.org/W4384395739","https://openalex.org/W4387793713","https://openalex.org/W6631721891","https://openalex.org/W6740232425","https://openalex.org/W6754412467","https://openalex.org/W6756391396","https://openalex.org/W6757252433","https://openalex.org/W6766204418","https://openalex.org/W6783510202","https://openalex.org/W6786125786","https://openalex.org/W6800467499","https://openalex.org/W6850789327","https://openalex.org/W6867071929","https://openalex.org/W6902390121","https://openalex.org/W6902707105","https://openalex.org/W7000573856","https://openalex.org/W7019515435"],"related_works":["https://openalex.org/W2911791775","https://openalex.org/W168400884","https://openalex.org/W1713081424","https://openalex.org/W94534956","https://openalex.org/W1996488985","https://openalex.org/W4237223266","https://openalex.org/W2917292038","https://openalex.org/W2127315869","https://openalex.org/W1523769955","https://openalex.org/W1788743787"],"abstract_inverted_index":{"A":[0],"recent":[1],"trend":[2],"towards":[3],"running":[4],"more":[5],"demanding":[6],"web":[7,46,82],"applications,":[8],"such":[9],"as":[10],"video":[11],"games":[12],"or":[13],"client-side":[14],"LLMs,":[15],"in":[16,74],"the":[17,22,25,34,52,66,75,86,91,106,112],"browser":[18],"has":[19,57,100],"led":[20],"to":[21,36,51,89],"adoption":[23],"of":[24,63,69,111,137],"WebGPU":[26,70,97],"standard":[27],"that":[28,79,115],"provides":[29],"a":[30,41,138],"cross-platform":[31],"API":[32],"exposing":[33],"GPU":[35,53],"websites.":[37],"This":[38],"opens":[39],"up":[40],"new":[42],"attack":[43],"surface:":[44],"Untrusted":[45],"content":[47],"is":[48,114],"passed":[49],"through":[50],"stack,":[54],"which":[55,84,125],"traditionally":[56],"been":[58],"optimized":[59],"for":[60],"performance":[61],"instead":[62],"security.":[64],"Worsening":[65],"problem,":[67],"most":[68],"cannot":[71],"be":[72],"run":[73],"tightly":[76],"sandboxed":[77],"process":[78],"manages":[80],"other":[81],"content,":[83],"eases":[85],"attacker's":[87],"path":[88],"compromising":[90],"client":[92],"machine.":[93],"Contrasting":[94],"its":[95],"importance,":[96],"shader":[98,116,134],"processing":[99],"received":[101],"surprisingly":[102],"little":[103],"attention":[104],"from":[105],"automated":[107],"testing":[108,132],"community.":[109],"Part":[110],"reason":[113],"translators":[117],"expect":[118],"highly":[119],"structured":[120],"and":[121,148],"statically":[122],"typed":[123],"input,":[124],"renders":[126],"typical":[127],"fuzzing":[128],"mutations":[129],"ineffective.":[130],"Complicating":[131],"further,":[133],"translation":[135],"consists":[136],"complex":[139],"multi-step":[140],"compilation":[141],"pipeline,":[142],"each":[143],"stage":[144],"presenting":[145],"unique":[146],"requirements":[147],"challenges.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2024-09-29T00:00:00"}
