{"id":"https://openalex.org/W4413403134","doi":"https://doi.org/10.3390/fi17080377","title":"A High-Acceptance-Rate VxWorks Fuzzing Framework Based on Protocol Feature Fusion and Memory Extraction","display_name":"A High-Acceptance-Rate VxWorks Fuzzing Framework Based on Protocol Feature Fusion and Memory Extraction","publication_year":2025,"publication_date":"2025-08-21","ids":{"openalex":"https://openalex.org/W4413403134","doi":"https://doi.org/10.3390/fi17080377"},"language":"en","primary_location":{"id":"doi:10.3390/fi17080377","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17080377","pdf_url":"https://www.mdpi.com/1999-5903/17/8/377/pdf?version=1755759469","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/8/377/pdf?version=1755759469","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100773308","display_name":"Yichuan Wang","orcid":"https://orcid.org/0000-0001-6575-1954"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichuan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050941029","display_name":"Junwei Han","orcid":"https://orcid.org/0000-0002-3276-0819"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhao Han","raw_affiliation_strings":["School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100779717","display_name":"Xi Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi Deng","raw_affiliation_strings":["School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073391035","display_name":"Xinhong Hei","orcid":"https://orcid.org/0000-0002-6394-0492"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinhong Hei","raw_affiliation_strings":["School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073391035"],"corresponding_institution_ids":["https://openalex.org/I4210131919"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25762086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"8","first_page":"377","last_page":"377"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9309166073799133},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8936915397644043},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.633140504360199},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5091208815574646},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.43554043769836426},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09410694241523743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9309166073799133},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8936915397644043},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.633140504360199},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5091208815574646},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.43554043769836426},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09410694241523743},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17080377","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17080377","pdf_url":"https://www.mdpi.com/1999-5903/17/8/377/pdf?version=1755759469","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:19be2fe7d3d041af8e918b3ddb7d211f","is_oa":true,"landing_page_url":"https://doaj.org/article/19be2fe7d3d041af8e918b3ddb7d211f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 8, p 377 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17080377","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17080377","pdf_url":"https://www.mdpi.com/1999-5903/17/8/377/pdf?version=1755759469","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5161959336","display_name":null,"funder_award_id":"62302389","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7274800278","display_name":null,"funder_award_id":"2022CGKC-09","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G8962730789","display_name":null,"funder_award_id":"U2468206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320338243","display_name":"JST-Mirai Program","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413403134.pdf","grobid_xml":"https://content.openalex.org/works/W4413403134.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1141167814","https://openalex.org/W2002934700","https://openalex.org/W2016716561","https://openalex.org/W2018041465","https://openalex.org/W2067877212","https://openalex.org/W2138703291","https://openalex.org/W2782780792","https://openalex.org/W2791018263","https://openalex.org/W2965717902","https://openalex.org/W2980096664","https://openalex.org/W3004423873","https://openalex.org/W3039783161","https://openalex.org/W3047947484","https://openalex.org/W3176127411","https://openalex.org/W3206111957","https://openalex.org/W3212565000","https://openalex.org/W4226509253","https://openalex.org/W4285298338","https://openalex.org/W4285301025","https://openalex.org/W4301951518","https://openalex.org/W4360981542","https://openalex.org/W4387834972","https://openalex.org/W4400016425","https://openalex.org/W4403294778","https://openalex.org/W4404102534","https://openalex.org/W6857539385","https://openalex.org/W6868933402"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4210660460","https://openalex.org/W3203597304"],"abstract_inverted_index":{"With":[0],"the":[1,10,29,32,54,62,65,84,94,98,103,151,178,196],"widespread":[2],"application":[3],"of":[4,6,12,31,61,67,97,107,200],"Internet":[5],"Things":[7],"(IoT)":[8],"devices,":[9,142],"security":[11,30],"embedded":[13,20],"systems":[14,75],"faces":[15],"severe":[16],"challenges.":[17],"As":[18],"an":[19],"operating":[21],"system":[22,39,141,173],"widely":[23],"used":[24],"in":[25,35,165,219],"critical":[26],"mission":[27],"scenarios,":[28],"TCP":[33,217],"stack":[34],"VxWorks":[36,74,108,140,180,204],"directly":[37],"affects":[38],"reliability.":[40],"However,":[41],"existing":[42,157],"protocol":[43,110,186,201],"fuzzing":[44,159,202],"methods":[45],"based":[46],"on":[47,138],"network":[48,109],"communication":[49],"struggle":[50],"to":[51,53,77,129],"adapt":[52],"complex":[55],"state":[56],"machine":[57],"and":[58,117,126,171,189,198,212],"grammatical":[59],"rules":[60],"TCP.":[63,99],"Additionally,":[64],"lack":[66],"a":[68,114,119,210],"runtime":[69],"feedback":[70,191],"mechanism":[71,123],"for":[72,203,215],"closed-source":[73],"leads":[76],"low":[78],"testing":[79],"efficiency.":[80],"This":[81],"paper":[82],"proposes":[83],"vxTcpFuzzer":[85,144,161],"framework,":[86],"which":[87],"generates":[88],"structured":[89],"test":[90,166,172],"cases":[91],"by":[92],"integrating":[93],"field":[95],"features":[96],"Innovatively,":[100],"it":[101],"uses":[102],"memory":[104,190],"data":[105],"changes":[106],"processing":[111],"tasks":[112],"as":[113],"coverage":[115],"metric":[116],"combines":[118],"dual":[120],"anomaly":[121,132],"detection":[122,125],"(WDB":[124],"heartbeat":[127],"detection)":[128],"achieve":[130],"precise":[131],"capture.":[133],"We":[134],"conducted":[135],"experimental":[136],"evaluations":[137],"three":[139,156,179],"where":[143],"successfully":[145],"triggered":[146],"multiple":[147],"potential":[148],"vulnerabilities,":[149],"verifying":[150],"framework\u2019s":[152],"effectiveness.":[153],"Compared":[154],"with":[155],"classic":[158],"schemes,":[160],"demonstrates":[162],"significant":[163],"advantages":[164],"case":[167],"acceptance":[168],"rates":[169,175],"(44.94\u201354.92%)":[170],"abnormal":[174],"(23.79\u201334.70%)":[176],"across":[177],"devices.":[181],"The":[182],"study":[183],"confirms":[184],"that":[185],"feature":[187],"fusion":[188],"mechanisms":[192],"can":[193],"effectively":[194],"enhance":[195],"depth":[197],"efficiency":[199],"systems.":[205],"Furthermore,":[206],"this":[207],"approach":[208],"offers":[209],"practical":[211],"effective":[213],"solution":[214],"uncovering":[216],"vulnerabilities":[218],"black-box":[220],"environments.":[221]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
