{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:52:23Z","timestamp":1747806743143},"reference-count":22,"publisher":"Elsevier BV","issue":"14","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1016\/j.comcom.2008.05.041","type":"journal-article","created":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T08:44:11Z","timestamp":1213433051000},"page":"3420-3426","source":"Crossref","is-referenced-by-count":8,"title":["TFTP vulnerability finding technique based on fuzzing"],"prefix":"10.1016","volume":"31","author":[{"given":"Qixu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2008.05.041_bib1","unstructured":"Black Hat, Vulnerability finding in win32, 2004. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.blackhat.com\/presentations\/bh-usa-04\/bh-us-04-fx.pdf>."},{"issue":"2","key":"10.1016\/j.comcom.2008.05.041_bib2","first-page":"58","article-title":"Violating assumptions with fuzzing","volume":"3","author":"Oehlert","year":"2005","journal-title":"IEEE Computer Society"},{"key":"10.1016\/j.comcom.2008.05.041_bib3","unstructured":"K. Sollins, RFC1350 Revision2, The TFTP Protocol, Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.faqs.org\/rfcs\/rfc1350.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib4","series-title":"Writing Secure Code","author":"Howard","year":"2002"},{"key":"10.1016\/j.comcom.2008.05.041_bib5","unstructured":"Ilja van Sprundel, Fuzzing: Breaking Software in an automated fashion, 2005. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/events.ccc.de\/congress\/2005\/fahrplan\/attachments\/582-paper_fuzzing.pdf>."},{"key":"10.1016\/j.comcom.2008.05.041_bib6","unstructured":"Justin E. Forrester, Barton P. Miller, Bryan So, An empirical study of the robustness of Windows NT applications using random testing, 4th USENIX Windows System Symposium, Seattle, 2000."},{"key":"10.1016\/j.comcom.2008.05.041_bib7","doi-asserted-by":"crossref","unstructured":"B.P. Miller, G. Cooksey, F. Moore, An empirical study of the robustness of MacOS applications using random testing, First International Workshop on Random Testing, Portland, Maine, July 2006.","DOI":"10.1145\/1145735.1145743"},{"key":"10.1016\/j.comcom.2008.05.041_bib8","doi-asserted-by":"crossref","unstructured":"Barton P. Miller, Louis Fredriksen, Bryan So, An empirical study of the reliability of UNIX utilities, Communications of the ACM 33 (12) (1990) 32-44.","DOI":"10.1145\/96267.96279"},{"key":"10.1016\/j.comcom.2008.05.041_bib9","unstructured":"Dave Aitel, The Advantages of Block-Based Protocol Analysis for Security Testing, New York, 2002. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.immunitysec.com\/downloads\/advantages_of_block_based_analysis.txt>."},{"key":"10.1016\/j.comcom.2008.05.041_bib10","unstructured":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.infosecinstitute.com\/blog\/2005\/12\/fuzzers-ultimate-list.html."},{"key":"10.1016\/j.comcom.2008.05.041_bib11","unstructured":"Martin Vuagnoux, Autodaf\u00e9: An Act of Software Torture, 22nd Chaos Communication Congress, December 2005. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/events.ccc.de\/congress\/2005\/fahrplan\/events\/606.en.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib12","unstructured":"The Digital Dwarf Society, a group that strongly believes in Fuzzing. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.digitaldwarf.be\/>."},{"key":"10.1016\/j.comcom.2008.05.041_bib13","unstructured":"A. Emberson, RFC 2090, TFTP Multicast Option. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.faqs.org\/rfcs\/rfc2090.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib14","unstructured":"G. Malkin, A. Harkin, RFC 2347, TFTP Option Extension. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.faqs.org\/rfcs\/rfc2347.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib15","unstructured":"G. Malkin, A. Harkin, RFC 2348, TFTP Blocksize Option. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.faqs.org\/rfcs\/rfc2348.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib16","unstructured":"G. Malkin, A. Harkin, RFC 2349, TFTP Timeout Interval and Transfer Size Options. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.faqs.org\/rfcs\/rfc2349.html>."},{"key":"10.1016\/j.comcom.2008.05.041_bib17","unstructured":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.frsirt.com\/english\/."},{"key":"10.1016\/j.comcom.2008.05.041_bib18","unstructured":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.scadasec.net\/secwiki\/FuzzingTools."},{"key":"10.1016\/j.comcom.2008.05.041_bib19","unstructured":"Ilja van Sprundel, tftpfuzz, https:\/\/linproxy.fan.workers.dev:443\/http\/www.digitaldwarf.be\/products\/tftpfuzz.py."},{"key":"10.1016\/j.comcom.2008.05.041_bib20","unstructured":"https:\/\/linproxy.fan.workers.dev:443\/http\/cve.mitre.org\/."},{"key":"10.1016\/j.comcom.2008.05.041_bib21","unstructured":"www.datarescue.com\/ida.htm."},{"key":"10.1016\/j.comcom.2008.05.041_bib22","unstructured":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.immunitysec.com\/products-immdbg.shtml."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366408003447?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366408003447?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T03:37:35Z","timestamp":1557632255000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366408003447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":22,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["S0140366408003447"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2008.05.041","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}