{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,5,31]],“日期-时间”:“2024-05-31T15:15:20Z”,“时间戳”:1717168520890},“参考-计数”:55,“出版商”:“IEEE”,“许可证”:[{“开始”:{-“日期-零件”:[2019,5,1]],”日期-时间“:”2019-05-01T00:00:00Z“,”timestamp“:1556668800000},”content-version“:”vor“,“延迟天数”:0,“URL”:“https://ieeexplore.ieee.org/Xplorehelp\/downloads\/license-information\/ieee.html”},{“开始”:{“日期部分”:[[2019,5,1]],“日期时间”:“2019-05-01T0:00:00Z”,“时间戳”:1556668800000},“内容版本”:“stm-asf”,“延迟天数”:0,“URL”:“https://doi.org/10.15223\/policy-009”},{“开始”:{日期部分”:[[2019,5,1]],“date-time”:“2019-05-01T00:00:00Z”,“timestamp”:1556668800000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-001”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2019,5]},“doi”:“10.1109\/sp.2019.00057”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2019,9,17]],“date-time”:“2019-09-17T02:02:02Z”,“timestamp”:1568685782000},“source”:“Crossref”,“is-referenced-by-count”:61,“title”:[“ProFuzzer:On-the-fly Input Type Probing for Better Zero Day Vulnerability Discovery”],“prefix”:“10.1109”,”author“[{”given“Wei”,“family”:“You”,:“第一个”,“隶属关系”:[]},{“给定”:“薛强”,“家庭”:“王”,“序列”:“附加”,“隶属”:[]},}“给定的”:“石青”,“家族”:“马”,“顺序”:“额外”,“从属关系”:[]}:[]},{“给定”:“晓峰”,“family”:“Wang”,“sequence”:“additional”,“affiliation”:[]}},{“key”:“ref33”,“year”:“0”,“journal-title”:“模糊化项目”},{“key”:“ref32”,“year”:“0”,“journal title”:“Oss fuzz”},{“key”:“ref31”,“doi断言者”:“publisher”,“doi”:“10.1109\/SP.20128.00040”},{“key”:“ref30”,“doi断言者”:“publisher”,“doi”:“10.1145\/313956.3134062”},{“key”:“ref37”,“year”:“0”,“journal title”:“Mupdf issues”},{“key”:“ref36”,“year”:“0”,“journal title”:“Libav issues”},{“key”:“ref35”,“year”:“0”,“journal-title”:“Afl testcases”}:“优化模糊化种子选择”,“author”:“rebert”,“year”:“2014”,“journal-title”:“第23届USENIX安全研讨会论文集2014 Security”},{“key”:“ref29”,“doi-asserted-by”:“publisher”,“doi”:“10.1371”\/journal.pcbi.1004568”}0英寸,“journal-title”:“Oss-fuzz五个月后的奖励项目”},{“key”:“ref20”,“year”:“0”,“johnal-title:“afl-fuzz用手头的字典编造语法”}、{“key”:”ref22“,“year:”0“,“jornal-tittle:”Tcp-rfc“},”{“key”:“ref21”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1375581.1375607”}“,{”key“:”ref24“,“物品标签”:“二进制执行数据结构的自动逆向工程”,“author”:“lin”,“year”:“2010”,“journal-title”:“网络与分布式系统安全研讨会NDSS-95”},{“key”:“ref23”,“年份”:“0”,“日记标题”:“Wikipedia Bmp文件格式”}:“Howard:逆向工程数据结构的动态挖掘机”,“author”:“slowinska”,“year”:“2011”,“journal-title”:“the Symposium on Network and Distributed System Security NDSS-95”},{“key”:“ref25”,“article-title“:“TIE:二进制程序中类型的原则性逆向工程”:“网络与分布式系统安全NDSS-95研讨会”},{“key”:“ref50”,“article-title”:“Moonshine:使用跟踪蒸馏优化操作系统模糊器种子选择”,“author”:“pailoor”,“year”:“2018”,“journal-title“:“第27届USENIX安全研讨会论文集Security”}:“Fairfuzz:以稀有分支为目标快速增加灰盒模糊测试覆盖率”,“author”:“lemieux”,“year”:“2018”,“journal-title”:“第33届IEEE\/ACM自动化软件工程ASE国际会议论文集”},{“key”:“ref55”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3133956.3134046”}:“Dowsing for overflows:a guided fuzzer to find buffer boundary contraction”,“author”:“haller”,“year”:“2013”,“journal-title”:“Proceedings of the 22th USENIX Security Symposium Security”},{“key”:“ref53”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3133956.3134085”},{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SP.2015.50”},{“密钥”:“ref11”,“年份”:“0”,“日志标题”:“American Fuzzy Lop(AFL)”}“:”10.14722\/ndss.2017.23404“},{”key“:”ref13“,”doi-asserted-by“:”publisher“,“DOI”:“10.14722\/ndss.2016.23368”},{“key”:“ref14”,“article-title”:“QSYM:一个为混合模糊化量身定制的实用混合执行引擎”,“author”:“yun”,“year”:“2018”,“journal-title“:“第27届USENIX安全研讨会论文集”}新闻标题“:“Google fuzzer测试套件”},{“key”:“ref17”,“year”:“0”,“journal title”:“Exiv2 issues”},{“key”:“ref18”,“year”:“0”,“journal title”:“OpenJPEG”},{“key”:“ref19”,“year”:“0”,“journal title”:“SPIKE fuzzer”},{“key”:“ref3”,“year”:“0”,“期刊标题”:“Peach Fuzzer”},{“key”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ASE.2017.8115618”}“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/2976749.2978428“},{”key“:”ref49“,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICSE.2007.41”},{“key”:“ref9”,“article-title”:“并非所有字节都相等:模糊化的神经字节筛”,“volume”:”abs 1711 4596“,”author“:”rajpal“,”year“:”2017“,”journal-title“:”CoRR,“年份”:“2007年”,“新闻标题”:“第十六届USENIX安全研讨会论文集”},{“key”:“ref45”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1315245.1315286”}、{“密钥”:“ref48”,“doi-asserte-by”:“publisher”,“DI:”10.1145\/1255770.155802“},“key“:”ref47“,“article-title”:“自动网络协议分析”,“author”:“wondracek”,“year”:“2008”,“journal-title”:“NDSS the Internet Society”},{“key”:“ref42”,“doi-asserted-by”:“publisher”,”doi“:”10.1145\/3274694.3274746“},”{“key”:”ref41“,”doi-assert-by“:”publisher \/1455770.1455820“},{”key“:”ref43“,”doi-asserted-by“:“publisher”,“DOI”:“10.1109\\SP.2010.37”}],“event”:{“name”:“2019 IEEE安全与隐私研讨会(SP)”,“location”:“San Francisco,CA,USA”,“start”:{“date parts”:[[2019,5.19]]},“end”:{“date parts”:[[2019,5.23]]},“container title”:[“2019 IEEE安全与隐私研讨会(SP)”],“original title”:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/8826229\/8835208\/088355384.pdf?arnumber=8835384”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,7,17]],“date-time”:”2022-07-17T21:54:37Z“,”timestamp“1658094877000},“score”:1,“resource”“:{”primary“:{”URL“:“https:\/\/ieeexplore.iee.org\/document\/8835384\/”}},“副标题”:[],“短标题”:[],“发布”:{“日期-部件”:[[2019,5]]},”引用计数“:55,”URL“:”http://\/dx.doi.org\/10.109\/sp.2019.00057“,”关系“:{}”主题“:[]”,“发布的:{”日期-部件“:[2019,5]}}}