{"id":"https://openalex.org/W4416549240","doi":"https://doi.org/10.1145/3719027.3744807","title":"Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components","display_name":"Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549240","doi":"https://doi.org/10.1145/3719027.3744807"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3744807","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744807","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744807","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744807","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103976122","display_name":"Yuke Tian","orcid":"https://orcid.org/0009-0000-3866-4070"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunpeng Tian","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China and The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China and The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076296815","display_name":"Feng Dong","orcid":"https://orcid.org/0000-0001-7091-2169"},"institutions":[{"id":"https://openalex.org/I4210157617","display_name":"Huazhong University of Science and Technology Hospital","ror":"https://ror.org/05f9vfg11","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210157617"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Dong","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641","https://openalex.org/I4210157617"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058201981","display_name":"Junhai Wang","orcid":"https://orcid.org/0009-0003-4328-5413"},"institutions":[{"id":"https://openalex.org/I4210157617","display_name":"Huazhong University of Science and Technology Hospital","ror":"https://ror.org/05f9vfg11","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210157617"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhai Wang","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641","https://openalex.org/I4210157617"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100695047","display_name":"Mu Zhang","orcid":"https://orcid.org/0000-0001-5905-9515"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mu Zhang","raw_affiliation_strings":["University of Utah, Salt Lake City, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025990839","display_name":"Zhiniang Peng","orcid":"https://orcid.org/0000-0002-8463-1971"},"institutions":[{"id":"https://openalex.org/I4210157617","display_name":"Huazhong University of Science and Technology Hospital","ror":"https://ror.org/05f9vfg11","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210157617"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiniang Peng","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641","https://openalex.org/I4210157617"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116756647","display_name":"Zesen Ye","orcid":"https://orcid.org/0009-0005-0353-6307"},"institutions":[{"id":"https://openalex.org/I68581759","display_name":"China Academy of Launch Vehicle Technology","ror":"https://ror.org/012z62f48","country_code":"CN","type":"facility","lineage":["https://openalex.org/I68581759"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zesen Ye","raw_affiliation_strings":["Beijing CyberKunlun Technology Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing CyberKunlun Technology Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I68581759"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115695530","display_name":"Haoyu Wang","orcid":"https://orcid.org/0000-0003-1100-8633"},"institutions":[{"id":"https://openalex.org/I4210157617","display_name":"Huazhong University of Science and Technology Hospital","ror":"https://ror.org/05f9vfg11","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210157617"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641","https://openalex.org/I4210157617"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5103976122"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18597,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"798","last_page":"812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7735999822616577,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.7735999822616577,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.09160000085830688,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.06109999865293503,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.7932999730110168},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.6388000249862671},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.5866000056266785},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5562000274658203},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4977000057697296},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.3192000091075897},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.31520000100135803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8011000156402588},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.7932999730110168},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.6388000249862671},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.5866000056266785},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5562000274658203},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4977000057697296},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3133000135421753},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2955999970436096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2791999876499176},{"id":"https://openalex.org/C175708663","wikidata":"https://www.wikidata.org/wiki/Q899559","display_name":"X-ray photoelectron spectroscopy","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2612999975681305},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2574000060558319}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3744807","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744807","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744807","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3744807","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744807","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744807","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2446800553","display_name":"CICI:SIVD:Context-Aware Vulnerability Detection in Configurable Scientific Computing Environments","funder_award_id":"2115167","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5990262953","display_name":null,"funder_award_id":"OAC-2115167","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306250","display_name":"Battelle","ror":"https://ror.org/01h5tnr73"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549240.pdf","grobid_xml":"https://content.openalex.org/works/W4416549240.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W2032625371","https://openalex.org/W2499791918","https://openalex.org/W2583649498","https://openalex.org/W3136127207","https://openalex.org/W4293686148","https://openalex.org/W4391724785","https://openalex.org/W4402264433","https://openalex.org/W4402442760","https://openalex.org/W4403223258"],"related_works":[],"abstract_inverted_index":{"Windows":[0,159],"printing":[1,20,123],"services":[2,25],"remain":[3],"a":[4,51,76,110,128],"notable":[5],"vector":[6],"for":[7],"attacks.":[8],"Previous":[9],"studies":[10],"have":[11],"predominantly":[12],"targeted":[13],"vulnerabilities":[14,176],"within":[15,41],"various":[16],"control":[17],"aspects":[18],"of":[19,36,86],"services,":[21],"such":[22],"as":[23],"spooler":[24],"and":[26,180],"firmware":[27],"updates.":[28],"Yet,":[29],"we":[30,74,108,132],"contend":[31],"that":[32,91,115,154],"an":[33],"essential":[34],"aspect":[35],"data":[37],"processing\u2014the":[38],"document":[39],"parser":[40],"printer":[42,64,106],"drivers\u2014has":[43],"been":[44],"overlooked":[45],"in":[46,61,139,148,161,167],"past":[47],"research.":[48],"We":[49],"present":[50],"coverage-based":[52],"fuzzing":[53,99],"system,":[54],"PrintXPSurge,":[55],"specifically":[56],"crafted":[57],"to":[58,82,135],"detect":[59],"weaknesses":[60],"the":[62,84,104,121,140,149],"XPS":[63,72,89,105,141],"driver's":[65],"parsing":[66],"function.":[67],"To":[68,96],"craft":[69],"semantically":[70,87],"correct":[71,88],"files,":[73],"leverage":[75],"large":[77],"language":[78],"model-assisted":[79],"repair":[80],"approach":[81],"automate":[83],"creation":[85],"files":[90],"comply":[92],"with":[93,103],"necessary":[94],"constraints.":[95],"ensure":[97],"our":[98],"process":[100],"effectively":[101],"interacts":[102],"driver,":[107],"develop":[109],"progressive":[111],"state":[112],"reconstruction":[113],"method":[114],"addresses":[116],"individual":[117],"dependency":[118],"requirements":[119],"across":[120],"entire":[122],"service":[124],"workflow.":[125],"Furthermore,":[126],"when":[127],"crash":[129],"is":[130],"detected,":[131],"employ":[133],"backtracing":[134],"confirm":[136],"its":[137],"origin":[138],"parser,":[142],"isolating":[143],"it":[144],"from":[145,170],"other":[146],"components":[147],"pipeline.":[150],"Our":[151],"evaluation":[152],"reveals":[153],"PrintXPSurge":[155],"surpasses":[156],"existing":[157],"top":[158],"fuzzers":[160],"performance,":[162],"successfully":[163],"identifying":[164],"102":[165],"bugs":[166],"10":[168],"drivers":[169],"major":[171],"brands,":[172],"including":[173],"17":[174],"zero-day":[175],"confirmed":[177],"by":[178],"Microsoft":[179],"third-party":[181],"vendors.":[182]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-11-23T00:00:00"}
