{"id":"https://openalex.org/W4386365861","doi":"https://doi.org/10.18293/seke2023-122","title":"Detect Stack Overflow Bugs in Rust via Improved Fuzzing Technique","display_name":"Detect Stack Overflow Bugs in Rust via Improved Fuzzing Technique","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4386365861","doi":"https://doi.org/10.18293/seke2023-122"},"language":"en","primary_location":{"id":"doi:10.18293/seke2023-122","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-122","pdf_url":"https://doi.org/10.18293/seke2023-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2023-122","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002127283","display_name":"Zhiyong Jason Ren","orcid":"https://orcid.org/0000-0001-7606-0331"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyong Ren","raw_affiliation_strings":["School of Computer Science School of Computer Science Fudan University, Shanghai, China","Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science School of Computer Science Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014520888","display_name":"Hui Xu","orcid":"https://orcid.org/0000-0003-2465-8627"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Xu","raw_affiliation_strings":["Fudan University, Shanghai, China","School of Computer Science School of Computer Science Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"School of Computer Science School of Computer Science Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002127283"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.4292,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68590296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"2023","issue":null,"first_page":"175","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9355076551437378},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.8463054895401001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7891086339950562},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.48036012053489685},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.47732076048851013},{"id":"https://openalex.org/keywords/rust","display_name":"Rust (programming language)","score":0.47362157702445984},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4508613348007202},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.44987574219703674},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.32031843066215515},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.12873870134353638}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9355076551437378},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.8463054895401001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7891086339950562},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.48036012053489685},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.47732076048851013},{"id":"https://openalex.org/C197781089","wikidata":"https://www.wikidata.org/wiki/Q575650","display_name":"Rust (programming language)","level":2,"score":0.47362157702445984},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4508613348007202},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.44987574219703674},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.32031843066215515},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12873870134353638}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2023-122","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-122","pdf_url":"https://doi.org/10.18293/seke2023-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2023-122","is_oa":true,"landing_page_url":"https://doi.org/10.18293/seke2023-122","pdf_url":"https://doi.org/10.18293/seke2023-122","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386365861.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2037984920","https://openalex.org/W2056396795","https://openalex.org/W2153185479","https://openalex.org/W2534652523","https://openalex.org/W3003421029","https://openalex.org/W3006937969","https://openalex.org/W3039784053","https://openalex.org/W3125156610","https://openalex.org/W4310537092","https://openalex.org/W6604051446"],"related_works":["https://openalex.org/W3010592047","https://openalex.org/W4200421685","https://openalex.org/W4386534318","https://openalex.org/W4394745891","https://openalex.org/W3000246040","https://openalex.org/W4388997031","https://openalex.org/W2954966352","https://openalex.org/W3212191335","https://openalex.org/W4241006348","https://openalex.org/W3003421029"],"abstract_inverted_index":{"Stack":[0],"overflow":[1,44,56,75,146,188],"has":[2],"been":[3],"a":[4,9,34,66,82,155,191],"common":[5],"memory":[6,29],"vulnerability":[7],"for":[8,129],"long":[10],"time":[11,158],"due":[12],"to":[13,25,52,72,116,127,143,160,178],"limited":[14],"stack":[15,28,43,55,74,145,179,187],"memory.Deep":[16],"or":[17],"infinite":[18],"recursion":[19],"serves":[20],"as":[21,96],"the":[22,27,32,91,100,106,118,130,135,162],"main":[23],"cause":[24],"exhaust":[26],"and":[30,120,175],"crash":[31],"program.As":[33],"relatively":[35],"new":[36],"system":[37],"programming":[38,60],"language,":[39],"Rust":[40,59,78,86,171],"suffers":[41],"from":[42],"problem":[45],"inevitably.However,":[46],"there":[47],"is":[48],"no":[49],"relevant":[50],"tool":[51],"detect":[53],"those":[54,110,150],"bugs":[57,76,147,189],"in":[58,77,99,190],"language.In":[61],"this":[62],"paper,":[63],"we":[64,112,133,153],"propose":[65],"novel":[67],"approach":[68,184],"using":[69],"fuzz":[70],"technique":[71],"trigger":[73,144,186],"projects.We":[79],"first":[80],"build":[81],"call":[83,92,157],"graph":[84],"on":[85,168],"MIR":[87],"(Middle":[88],"Intermediate":[89],"Representation).In":[90],"graph,":[93],"recursions":[94],"appear":[95],"cycles":[97],"lying":[98],"SCCs":[101,119],"(strong":[102],"connect":[103],"components).To":[104],"find":[105],"entry":[107],"APIs":[108],"of":[109,138],"SCCs,":[111],"leverage":[113],"Tarjan's":[114],"algorithm":[115],"locate":[117],"then":[121],"reversely":[122],"BFS":[123],"(Breadth":[124],"First":[125],"Search)":[126],"search":[128],"APIs.After":[131],"that,":[132],"modify":[134],"underlying":[136],"logic":[137],"AFL":[139],"(American":[140],"Fuzzing":[141],"Loop)":[142],"through":[148],"fuzzing":[149,163],"dangerous":[151],"APIs.Specifically,":[152],"add":[154],"function":[156],"counter":[159],"accelerate":[161],"process.We":[164],"conduct":[165],"our":[166,183],"experiments":[167],"several":[169],"existing":[170],"CVEs":[172],"(Common":[173],"Vulnerabilities":[174],"Exposures)":[176],"related":[177],"overflow.Experiments":[180],"show":[181],"that":[182],"can":[185],"short":[192],"time.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
