{"id":"https://openalex.org/W2989837574","doi":"https://doi.org/10.1145/3359789.3359826","title":"SRFuzzer","display_name":"SRFuzzer","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2989837574","doi":"https://doi.org/10.1145/3359789.3359826","mag":"2989837574"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100433533","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0002-3250-4284"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050683592","display_name":"Wei Huo","orcid":"https://orcid.org/0009-0000-7121-1196"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Huo","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038651975","display_name":"Kunpeng Jian","orcid":"https://orcid.org/0009-0002-8304-1045"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kunpeng Jian","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113637321","display_name":"Ji Shi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ji Shi","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100849894","display_name":"Haoliang Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haoliang Lu","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031091539","display_name":"Longquan Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Longquan Liu","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337560","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0002-3119-4763"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050619121","display_name":"Dandan Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dandan Sun","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024272804","display_name":"Chao Zhang","orcid":"https://orcid.org/0000-0002-5929-0853"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zhang","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031113046","display_name":"Baoxu Liu","orcid":"https://orcid.org/0009-0006-9851-5548"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baoxu Liu","raw_affiliation_strings":["CAS, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CAS, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5100433533"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.6131,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.94918102,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"544","last_page":"556"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.833177387714386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7505273818969727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7030462026596069},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5726132988929749},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5396847724914551},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.49237120151519775},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4370105564594269},{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.4349651634693146},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4321073889732361},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.42711761593818665},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33052417635917664},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.21337026357650757},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1474210023880005},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11415314674377441}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.833177387714386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7505273818969727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7030462026596069},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5726132988929749},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5396847724914551},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.49237120151519775},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4370105564594269},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.4349651634693146},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4321073889732361},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.42711761593818665},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33052417635917664},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.21337026357650757},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1474210023880005},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11415314674377441}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3359789.3359826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1694077306","https://openalex.org/W2043118292","https://openalex.org/W2091939272","https://openalex.org/W2109966155","https://openalex.org/W2113864883","https://openalex.org/W2123070675","https://openalex.org/W2180970301","https://openalex.org/W2209327732","https://openalex.org/W2216041415","https://openalex.org/W2532962075","https://openalex.org/W2574017551","https://openalex.org/W2576376563","https://openalex.org/W2613534458","https://openalex.org/W2740510556","https://openalex.org/W2747125559","https://openalex.org/W2782780792","https://openalex.org/W2902165566","https://openalex.org/W2927166905","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2611265297","https://openalex.org/W1976299830","https://openalex.org/W2548409577","https://openalex.org/W2407701912","https://openalex.org/W3180404666","https://openalex.org/W1531015913","https://openalex.org/W1484631816","https://openalex.org/W2167752994","https://openalex.org/W2907218437","https://openalex.org/W2117221897"],"abstract_inverted_index":{"SOHO":[0,49],"(small":[1],"office/home":[2],"office)":[3],"routers":[4,50],"provide":[5],"services":[6],"for":[7],"end":[8,38],"devices":[9],"to":[10,12,62,92],"connect":[11],"the":[13,20,32,52,63],"Internet,":[14],"playing":[15],"an":[16],"important":[17],"role":[18],"in":[19,27,31,83],"cyberspace.":[21],"Unfortunately,":[22],"security":[23],"vulnerabilities":[24],"pervasively":[25],"exist":[26],"these":[28,42],"routers,":[29],"especially":[30],"web":[33,45],"server":[34,46],"modules,":[35],"greatly":[36],"endangering":[37],"users.":[39],"To":[40],"discover":[41,93],"vulnerabilities,":[43,89,95],"fuzzing":[44,82],"modules":[47],"of":[48,65,69,76],"is":[51,59],"most":[53],"popular":[54],"solution.":[55],"However,":[56],"its":[57],"effectiveness":[58],"limited,":[60],"due":[61],"lack":[64,68,75],"input":[66],"specification,":[67],"routers'":[70],"internal":[71],"running":[72],"states,":[73],"and":[74,90],"testing":[77],"environment":[78],"recovery":[79],"mechanisms.":[80],"Moreover,":[81],"general":[84],"only":[85],"reports":[86],"memory":[87],"corruption":[88],"fails":[91],"other":[94],"e.g.,":[96],"web-based":[97],"vulnerabilities.":[98]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2019-12-05T00:00:00"}
