{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:37:40Z","timestamp":1730259460740,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icst60714.2024.00022","type":"proceedings-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:19:42Z","timestamp":1724779182000},"page":"151-160","source":"Crossref","is-referenced-by-count":0,"title":["Formatted Stateful Greybox Fuzzing of TLS Server"],"prefix":"10.1109","author":[{"given":"Fan","family":"Hu","sequence":"first","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education,China"}]},{"given":"Jiangan","family":"Ji","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education,China"}]},{"given":"Hui","family":"Shu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education,China"}]},{"given":"Zheming","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]},{"given":"Tieming","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cyberspace Security, Ministry of Education,China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University,China"}]}],"member":"263","reference":[{"volume-title":"The Heartbleed Bug","year":"2020","key":"ref1"},{"key":"ref2","first-page":"58","article-title":"The poodle attack: How the sslv3.0 fallback hurts security","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Securitys","author":"Vanhoef","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"volume-title":"american fuzzy lop","year":"2021","author":"Zalewski","key":"ref4"},{"volume-title":"TLSFuzzer: TLS Test Suite and Fuzzer","author":"Kario","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"volume-title":"TLS-Attacker: A Java-based Framework for Analyzing TLS Libraries","key":"ref7"},{"key":"ref8","first-page":"4481","article-title":"Bleem: Packet sequence oriented fuzzing for protocol implementations","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Luo","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.46"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.27"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2763947"},{"key":"ref14","first-page":"193","article-title":"Protocol state fuzzing of {TLS} implemen-tations","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"De Ruiter","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00051"},{"issue":"1","key":"ref16","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman","year":"1998","journal-title":"Digital Technical Journal"},{"volume-title":"libFuzzer - a library for coverage-guided fuzz testing","year":"2021","key":"ref17"},{"key":"ref18","first-page":"2597","article-title":"Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schumilo","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534376"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3192991"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3580598"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10233-3"},{"volume-title":"Stateful Greybox Fuzzing","year":"2022","author":"Ba","key":"ref24"},{"volume-title":"Wireshark","year":"2023","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095200"},{"volume-title":"etpl-tool","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469077"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598130"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3497776.3517765"}],"event":{"name":"2024 IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2024,5,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx8\/10638518\/10638509\/10638572.pdf?arnumber=10638572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:15:40Z","timestamp":1725081340000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/10638572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":30,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/icst60714.2024.00022","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}