{"id":"https://openalex.org/W3095742938","doi":"https://doi.org/10.23919/mipro48935.2020.9245083","title":"Bug detection in embedded environments by fuzzing and symbolic execution","display_name":"Bug detection in embedded environments by fuzzing and symbolic execution","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3095742938","doi":"https://doi.org/10.23919/mipro48935.2020.9245083","mag":"3095742938"},"language":"en","primary_location":{"id":"doi:10.23919/mipro48935.2020.9245083","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro48935.2020.9245083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052375019","display_name":"Juraj Vijtiuk","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Juraj Vijtiuk","raw_affiliation_strings":["Sartura, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Sartura, Zagreb, Croatia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005675777","display_name":"Luka Perkov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luka Perkov","raw_affiliation_strings":["Sartura, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Sartura, Zagreb, Croatia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056903029","display_name":"Antonio Krog","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antonio Krog","raw_affiliation_strings":["Sartura, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Sartura, Zagreb, Croatia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052375019"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6077,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71452991,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1218","last_page":"1223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9891203045845032},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8433423042297363},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.8242236375808716},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.6408650279045105},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5346713662147522},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5069713592529297},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.49770429730415344},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.470277339220047},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45949438214302063},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.4549509882926941},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.42276713252067566}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9891203045845032},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8433423042297363},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.8242236375808716},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.6408650279045105},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5346713662147522},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5069713592529297},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.49770429730415344},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.470277339220047},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45949438214302063},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.4549509882926941},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.42276713252067566},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro48935.2020.9245083","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro48935.2020.9245083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1710734607","https://openalex.org/W2138788987","https://openalex.org/W2514974017","https://openalex.org/W2748868501","https://openalex.org/W2928702109","https://openalex.org/W2964241064","https://openalex.org/W6743493502"],"related_works":["https://openalex.org/W2004278744","https://openalex.org/W2801797726","https://openalex.org/W2914996832","https://openalex.org/W3095742938","https://openalex.org/W4381785649","https://openalex.org/W3172606155","https://openalex.org/W4226494072","https://openalex.org/W4283736421","https://openalex.org/W1637912404","https://openalex.org/W4287849816"],"abstract_inverted_index":{"OpenWrt":[0,111],"is":[1,29,48,65],"an":[2,30,96],"Open":[3,31,154],"Source":[4,155],"GNU/Linux":[5],"distribution":[6],"designed":[7],"for":[8,126],"embedded":[9,137,156],"devices":[10,40],"which,":[11],"although":[12],"primarily":[13],"targeting":[14],"home":[15],"routers,":[16],"can":[17],"run":[18],"on":[19,38,121,148],"residential":[20],"gateways,":[21],"other":[22],"IoT":[23],"(Internet":[24],"of":[25,77,88,98,151],"Things)":[26],"devices.":[27],"RIOT":[28,113],"Source,":[32],"real-time":[33],"multi-threading":[34],"operating":[35],"system":[36],"running":[37],"numerous":[39],"that":[41,53],"are":[42],"typically":[43],"found":[44],"in":[45,153],"IoT.":[46],"Fuzzing":[47],"a":[49,66],"software":[50,67],"testing":[51,68],"process":[52],"uses":[54],"random":[55],"inputs":[56],"to":[57,81,91,106,139,145],"track":[58],"unusual":[59],"behaviors":[60],"and":[61,103,112,124],"crashes.":[62],"Symbolic":[63],"execution":[64,105],"technique":[69],"which":[70,83],"executes":[71],"the":[72,89,149],"program":[73,90],"with":[74],"symbolic":[75,104],"instead":[76],"concrete":[78],"variable":[79],"values":[80,84],"analyze":[82],"cause":[85],"what":[86],"path":[87],"execute.":[92],"This":[93],"paper":[94],"offers":[95],"overview":[97],"how":[99],"we":[100],"used":[101,136,144],"fuzzing":[102,140],"automatically":[107],"detect":[108],"crashes":[109],"within":[110],"projects.":[114],"Special":[115],"focus":[116],"will":[117,142],"then":[118],"be":[119,143],"placed":[120],"detected":[122],"vulnerabilities":[123],"methods":[125],"identifying":[127],"such":[128],"issues.":[129],"Results":[130],"collected":[131],"by":[132],"subjecting":[133],"two":[134],"widely":[135],"distributions":[138],"tests":[141],"draw":[146],"conclusions":[147],"state":[150],"security":[152],"software.":[157]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
