{"id":"https://openalex.org/W4411093967","doi":"https://doi.org/10.1145/3713081.3731719","title":"Shepherd: High-Precision Coverage Inference for Response-guided Blackbox Fuzzing (Registered Report)","display_name":"Shepherd: High-Precision Coverage Inference for Response-guided Blackbox Fuzzing (Registered Report)","publication_year":2025,"publication_date":"2025-06-06","ids":{"openalex":"https://openalex.org/W4411093967","doi":"https://doi.org/10.1145/3713081.3731719"},"language":"en","primary_location":{"id":"doi:10.1145/3713081.3731719","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731719","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3713081.3731719","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Takuya Shimizu","orcid":"https://orcid.org/0009-0001-8519-0979"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Takuya Shimizu","raw_affiliation_strings":["Ricerca Security, Inc., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Ricerca Security, Inc., Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117854692","display_name":"Ryuichi Yoshizawa","orcid":"https://orcid.org/0009-0003-9280-0047"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ryuichi Yoshizawa","raw_affiliation_strings":["Ricerca Security, Inc., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Ricerca Security, Inc., Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011561636","display_name":"Kaoru Otsuka","orcid":"https://orcid.org/0000-0001-7326-1031"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaoru Otsuka","raw_affiliation_strings":["Ricerca Security, Inc., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Ricerca Security, Inc., Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yudai Fujiwara","orcid":"https://orcid.org/0009-0002-2784-7642"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yudai Fujiwara","raw_affiliation_strings":["Ricerca Security, Inc., Tokyo, Zaire"],"affiliations":[{"raw_affiliation_string":"Ricerca Security, Inc., Tokyo, Zaire","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110046455","display_name":"Yuichi Sugiyama","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuichi Sugiyama","raw_affiliation_strings":["Ricerca Security, Inc., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Ricerca Security, Inc., Tokyo, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11837563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9696404933929443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7285597324371338},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6722869277000427},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31270891427993774},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2682546079158783},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10113400220870972}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9696404933929443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7285597324371338},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6722869277000427},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31270891427993774},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2682546079158783},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10113400220870972}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3713081.3731719","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731719","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3713081.3731719","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731719","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1534295949","https://openalex.org/W2134633067","https://openalex.org/W2343325785","https://openalex.org/W2350778671","https://openalex.org/W2751862727","https://openalex.org/W2804093830","https://openalex.org/W2806746626","https://openalex.org/W2964241064","https://openalex.org/W2979357014","https://openalex.org/W3212565000","https://openalex.org/W4231934124","https://openalex.org/W4285142006","https://openalex.org/W4288084466","https://openalex.org/W6756301311"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4210660460","https://openalex.org/W3203597304"],"abstract_inverted_index":{"In":[0,54,147],"recent":[1],"years,":[2],"fuzzing":[3,20,36,57],"has":[4],"gained":[5],"attention":[6],"as":[7,49],"a":[8,85,134,152],"primary":[9],"means":[10],"for":[11,88],"the":[12,35,46,108,129,181],"early":[13],"detection":[14],"of":[15],"vulnerabilities.":[16],"Although":[17],"coverage-based":[18],"greybox":[19],"utilizes":[21],"internal":[22],"coverage":[23,75,93,105,154],"information":[24,62],"to":[25,33,97,144,166,180],"achieve":[26],"high":[27],"exploration":[28],"efficiency,":[29],"it":[30],"remains":[31],"difficult":[32],"employ":[34],"framework":[37],"in":[38,94,116],"some":[39],"restricted":[40],"environments":[41,96],"where":[42],"we":[43,150],"cannot":[44,76],"instrument":[45],"program,":[47],"such":[48],"firmware":[50],"or":[51],"smartphone":[52],"applications.":[53],"contrast,":[55],"blackbox":[56,95],"does":[58],"not":[59],"require":[60],"runtime":[61],"and":[63,113,128],"is":[64,84,137],"thus":[65],"more":[66],"widely":[67],"applicable,":[68],"but":[69],"suffers":[70],"from":[71],"lower":[72],"efficiency":[73],"because":[74],"be":[77],"measured.":[78],"To":[79],"address":[80],"this":[81,120,148],"issue,":[82],"there":[83],"growing":[86],"demand":[87],"methods":[89],"that":[90,131,173],"can":[91],"approximate":[92],"optimize":[98],"fuzzing.":[99],"One":[100],"existing":[101,182],"study":[102],"proposes":[103],"estimating":[104],"based":[106],"on":[107],"relationship":[109],"between":[110],"program":[111],"responses":[112],"strings":[114],"embedded":[115],"its":[117],"binary.":[118],"However,":[119],"approach":[121],"faces":[122],"challenges":[123],"with":[124,163],"ambiguous":[125],"matching":[126,162],"algorithms":[127],"non-uniqueness":[130],"occurs":[132],"when":[133],"single":[135],"string":[136,161],"shared":[138],"by":[139],"multiple":[140],"basic":[141],"blocks,":[142],"leading":[143],"frequent":[145],"misestimations.":[146],"research,":[149],"propose":[151],"new":[153],"inference":[155],"method,":[156],"Shepherd,":[157],"which":[158],"combines":[159],"high-precision":[160],"context":[164],"analysis":[165],"resolve":[167],"these":[168],"problems.":[169],"Experimental":[170],"results":[171],"show":[172],"Shepherd":[174],"significantly":[175],"improves":[176],"estimation":[177],"accuracy":[178],"compared":[179],"approach.":[183]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
