{"id":"https://openalex.org/W1984875943","doi":"https://doi.org/10.1587/transinf.e94.d.1008","title":"A State-Aware Protocol Fuzzer Based on Application-Layer Protocols","display_name":"A State-Aware Protocol Fuzzer Based on Application-Layer Protocols","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1984875943","doi":"https://doi.org/10.1587/transinf.e94.d.1008","mag":"1984875943"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.e94.d.1008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e94.d.1008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E94.D/5/E94.D_5_1008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E94.D/5/E94.D_5_1008/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013951413","display_name":"Takahisa Kitagawa","orcid":null},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takahisa KITAGAWA","raw_affiliation_strings":["Keio University"],"affiliations":[{"raw_affiliation_string":"Keio University","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048598986","display_name":"Miyuki Hanaoka","orcid":null},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Miyuki HANAOKA","raw_affiliation_strings":["Keio University"],"affiliations":[{"raw_affiliation_string":"Keio University","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100658539","display_name":"Kenji Kono","orcid":"https://orcid.org/0000-0002-8650-9822"},"institutions":[{"id":"https://openalex.org/I4210086780","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19","country_code":"JP","type":"government","lineage":["https://openalex.org/I4210086780"]},{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kenji KONO","raw_affiliation_strings":["CREST, Japan Science and Technology Agency","Keio University"],"affiliations":[{"raw_affiliation_string":"CREST, Japan Science and Technology Agency","institution_ids":["https://openalex.org/I4210086780"]},{"raw_affiliation_string":"Keio University","institution_ids":["https://openalex.org/I203951103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013951413"],"corresponding_institution_ids":["https://openalex.org/I203951103"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.14796716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"E94-D","issue":"5","first_page":"1008","last_page":"1017"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8884202241897583},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.8609063625335693},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6313612461090088},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6114755272865295},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6073057055473328},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6050793528556824},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.5677016377449036},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5531215667724609},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5173918008804321},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49073541164398193},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47717228531837463},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.47454938292503357},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.4554244875907898},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4550006687641144},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2207091748714447},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10450249910354614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07954779267311096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8884202241897583},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.8609063625335693},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6313612461090088},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6114755272865295},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6073057055473328},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6050793528556824},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.5677016377449036},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5531215667724609},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5173918008804321},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49073541164398193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47717228531837463},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.47454938292503357},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.4554244875907898},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4550006687641144},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2207091748714447},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10450249910354614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07954779267311096},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.e94.d.1008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e94.d.1008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E94.D/5/E94.D_5_1008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.e94.d.1008","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.e94.d.1008","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E94.D/5/E94.D_5_1008/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1984875943.pdf","grobid_xml":"https://content.openalex.org/works/W1984875943.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W157156687","https://openalex.org/W1483652549","https://openalex.org/W1506510492","https://openalex.org/W1655226010","https://openalex.org/W1710734607","https://openalex.org/W1998965451","https://openalex.org/W2009489720","https://openalex.org/W2065948900","https://openalex.org/W2066183757","https://openalex.org/W2096449544","https://openalex.org/W2102970979","https://openalex.org/W2115675703","https://openalex.org/W2128006558","https://openalex.org/W2129975948","https://openalex.org/W2132897303","https://openalex.org/W2147468904","https://openalex.org/W2155448819","https://openalex.org/W2172163424","https://openalex.org/W4234542549"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W4385301282","https://openalex.org/W3023977444","https://openalex.org/W2766647240","https://openalex.org/W2352737138","https://openalex.org/W1485337887"],"abstract_inverted_index":{"In":[0,22,81],"the":[1,19,34,59,72,87,108,115,157],"face":[2],"of":[3,36,62,78,94,102,110,117,159],"constant":[4],"malicious":[5],"attacks":[6],"to":[7,14,71],"network-connected":[8],"software":[9,11],"systems,":[10],"vulnerabilities":[12,138,145,150],"need":[13],"be":[15,154],"discovered":[16,155],"early":[17],"in":[18],"development":[20],"phase.":[21],"this":[23],"paper,":[24],"we":[25,119,129],"present":[26],"AspFuzz,":[27,118,128],"a":[28,99,165],"state-aware":[29],"protocol":[30,88],"fuzzer":[31],"based":[32],"on":[33],"specifications":[35,61,109],"application-layer":[37,63,111],"protocols.":[38,64,112],"AspFuzz":[39,52,96],"automatically":[40,97],"generates":[41,98],"anomalous":[42,103],"messages":[43,57,85,104],"that":[44,54,105],"exploit":[45],"possible":[46],"vulnerabilities.":[47],"The":[48],"key":[49],"observation":[50],"behind":[51],"is":[53],"most":[55],"attack":[56,84],"violate":[58,107],"strict":[60],"For":[65],"example,":[66],"they":[67],"do":[68],"not":[69],"conform":[70],"rigid":[73],"format":[74],"or":[75],"syntax":[76],"required":[77],"each":[79],"message.":[80],"addition,":[82],"some":[83],"ignore":[86],"states":[89],"and":[90,124,134,142],"have":[91],"incorrect":[92],"orders":[93],"messages.":[95],"large":[100],"number":[101],"deliberately":[106],"To":[113],"demonstrate":[114],"effectiveness":[116],"conducted":[120],"experiments":[121],"with":[122],"POP3":[123,140],"HTTP":[125,147],"servers.":[126,148],"With":[127],"can":[130,153,162],"discover":[131],"20":[132],"reported":[133,144],"1":[135],"previously":[136],"unknown":[137],"for":[139,146],"servers":[141],"25":[143],"Two":[149],"among":[151],"these":[152],"by":[156],"state-awareness":[158],"AspFuzz.":[160],"It":[161],"also":[163],"find":[164],"SIP":[166],"state-related":[167],"vulnerability.":[168]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
