{"id":"https://openalex.org/W4379052030","doi":"https://doi.org/10.1186/s42400-023-00143-2","title":"PosFuzz: augmenting greybox fuzzing with effective position distribution","display_name":"PosFuzz: augmenting greybox fuzzing with effective position distribution","publication_year":2023,"publication_date":"2023-06-01","ids":{"openalex":"https://openalex.org/W4379052030","doi":"https://doi.org/10.1186/s42400-023-00143-2"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00143-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00143-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00143-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00143-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073354871","display_name":"Yanyan Zou","orcid":"https://orcid.org/0000-0003-4787-4832"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanyan Zou","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033552469","display_name":"Wei Zou","orcid":"https://orcid.org/0000-0001-8704-8303"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zou","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104123614","display_name":"JiaCheng Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"JiaCheng Zhao","raw_affiliation_strings":["State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056810830","display_name":"Nanyu Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nanyu Zhong","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092068370","display_name":"Yu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100304743","display_name":"Ji Shi","orcid":"https://orcid.org/0009-0002-4889-195X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Shi","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050683592","display_name":"Wei Huo","orcid":"https://orcid.org/0009-0000-7121-1196"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Huo","raw_affiliation_strings":["Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5073354871"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.854,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8004374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9196314811706543},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.687751054763794},{"id":"https://openalex.org/keywords/mutation","display_name":"Mutation","score":0.5560933351516724},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.48967912793159485},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.43228501081466675},{"id":"https://openalex.org/keywords/estimation-of-distribution-algorithm","display_name":"Estimation of distribution algorithm","score":0.4237642288208008},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3577616810798645},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3021247982978821},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10821443796157837},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08829843997955322},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07960018515586853}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9196314811706543},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.687751054763794},{"id":"https://openalex.org/C501734568","wikidata":"https://www.wikidata.org/wiki/Q42918","display_name":"Mutation","level":3,"score":0.5560933351516724},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.48967912793159485},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.43228501081466675},{"id":"https://openalex.org/C162500139","wikidata":"https://www.wikidata.org/wiki/Q2835887","display_name":"Estimation of distribution algorithm","level":2,"score":0.4237642288208008},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3577616810798645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3021247982978821},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10821443796157837},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08829843997955322},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07960018515586853},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00143-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00143-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00143-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3d707a6e7739485cbc5cc724be9c6610","is_oa":true,"landing_page_url":"https://doaj.org/article/3d707a6e7739485cbc5cc724be9c6610","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00143-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00143-2","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00143-2","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2100943491","display_name":null,"funder_award_id":"62202462","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6786717514","display_name":null,"funder_award_id":"62032010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8845728377","display_name":null,"funder_award_id":"62032010","funder_id":"https://openalex.org/F4320315254","funder_display_name":"Innovative Research Group Project of the National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320315254","display_name":"Innovative Research Group Project of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4379052030.pdf"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1968177355","https://openalex.org/W2048881887","https://openalex.org/W2063918473","https://openalex.org/W2402268235","https://openalex.org/W2535617737","https://openalex.org/W2613534458","https://openalex.org/W2701225458","https://openalex.org/W2741068848","https://openalex.org/W2752340395","https://openalex.org/W2757104921","https://openalex.org/W2766540688","https://openalex.org/W2766647240","https://openalex.org/W2794670092","https://openalex.org/W2806377938","https://openalex.org/W2806746626","https://openalex.org/W2891235722","https://openalex.org/W2899189777","https://openalex.org/W2927166905","https://openalex.org/W2947182139","https://openalex.org/W2963846926","https://openalex.org/W2964097210","https://openalex.org/W3104664063","https://openalex.org/W3106010854","https://openalex.org/W3163844163","https://openalex.org/W4221146917","https://openalex.org/W4221162427","https://openalex.org/W4288057797"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W3023977444","https://openalex.org/W4210660460","https://openalex.org/W2064682937","https://openalex.org/W1983458561"],"abstract_inverted_index":{"Abstract":[0],"Mutation-based":[1,33],"greybox":[2,34,87],"fuzzing":[3,35,80,88],"has":[4,23],"been":[5,24],"one":[6],"of":[7,20,48,56,72,79,104,107,115,162],"the":[8,41,57,70,113,116,121,151,154,177,194,199],"most":[9],"prevalent":[10],"techniques":[11],"for":[12,135],"security":[13],"vulnerability":[14,211],"discovery":[15,212],"and":[16,31,118,165,170,173,186,202,210,218,226],"a":[17,46,85,105],"great":[18],"deal":[19],"research":[21,62],"work":[22,63],"proposed":[25],"to":[26,51,111,119,129,149],"improve":[27],"both":[28],"its":[29],"efficiency":[30],"effectiveness.":[32],"generates":[36],"input":[37,42,117],"cases":[38],"by":[39],"mutating":[40,147],"seed,":[43],"i.e.,":[44],"applying":[45],"sequence":[47],"mutation":[49,54,67,73,94,137],"operators":[50],"randomly":[52],"selected":[53],"positions":[55,74,95,152],"seed.":[58],"However,":[59],"existing":[60],"fruitful":[61],"focuses":[64],"on":[65,97,160,176,231,240],"scheduling":[66],"operators,":[68],"leaving":[69],"schedule":[71],"as":[75],"an":[76,131],"overlooked":[77],"aspect":[78],"efficiency.":[81],"This":[82],"paper":[83],"proposes":[84],"novel":[86],"method,":[89],"PosFuzz,":[90],"that":[91],"statistically":[92],"schedules":[93],"based":[96],"their":[98,205],"historical":[99],"performance.":[100],"PosFuzz":[101,123,159,220],"makes":[102],"use":[103],"concept":[106],"effective":[108,132],"position":[109,133],"distribution":[110,134],"represent":[112],"semantics":[114],"guide":[120],"mutations.":[122],"first":[124],"utilizes":[125],"Good-Turing":[126],"frequency":[127],"estimation":[128],"calculate":[130],"each":[136],"operator.":[138],"It":[139,233],"then":[140],"leverages":[141],"two":[142],"sampling":[143],"methods":[144],"in":[145,207],"different":[146],"stages":[148],"select":[150],"from":[153],"distribution.":[155],"We":[156],"have":[157],"implemented":[158],"top":[161],"AFL,":[163,216],"AFLFast":[164],"MOPT,":[166,219],"called":[167],"Pos-AFL,":[168,200],"-AFLFast":[169,201],"-MOPT":[171,203],"respectively,":[172],"evaluated":[174],"them":[175],"UNIFUZZ":[178],"benchmark":[179],"(20":[180],"widely":[181],"used":[182],"open":[183],"source":[184],"programs)":[185],"LAVA-M":[187],"dataset.":[188],"The":[189],"result":[190],"shows":[191],"that,":[192],"under":[193],"same":[195],"testing":[196],"time":[197],"budget,":[198],"outperform":[204],"counterparts":[206],"code":[208],"coverage":[209,225],"ability.":[213],"Compared":[214],"with":[215],"AFLFast,":[217],"gets":[221],"21%":[222],"more":[223,229,237],"edge":[224],"finds":[227],"133%":[228],"paths":[230],"average.":[232,241],"also":[234],"triggers":[235],"275%":[236],"unique":[238],"bugs":[239]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
