{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:43:21Z","timestamp":1726065801887},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030393021"},{"type":"electronic","value":"9783030393038"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39303-8_4","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T04:03:03Z","timestamp":1579838583000},"page":"41-54","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking"],"prefix":"10.1007","author":[{"given":"Hyuntae","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seongil","family":"Wi","sequence":"additional","affiliation":[]},{"given":"Hyunjoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"key":"4_CR1","unstructured":"Floodlight. \nhttp:\/\/www.projectfloodlight.org\/floodlight"},{"key":"4_CR2","unstructured":"JaCoCo: Java code coverage library. \nhttps:\/\/www.jacoco.org\/jacoco\/"},{"key":"4_CR3","unstructured":"Openflow switch specification: Version 1.3.1. \nhttps:\/\/www.opennetworking.org\/wp-content\/uploads\/2013\/04\/openflow-spec-v1.3.1.pdf"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Basta, A., Kellerer, W., Hoffmann, M., Morper, H.J., Hoffmann, K.: Applying NFV and SDN to LTE mobile core gateways, the functions placement problem. In: Proceedings of the Workshop on All Things Cellular: Operations, Applications and Challenges, pp. 33\u201338 (2014)","DOI":"10.1145\/2627585.2627592"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., Small, C.: Openflow vulnerability assessment. In: Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 151\u2013152 (2013)","DOI":"10.1145\/2491185.2491222"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCOM.2015.7060482","volume":"53","author":"L Bertaux","year":"2015","unstructured":"Bertaux, L., et al.: Software defined networking and virtualization for broadband satellite networks. IEEE Commun. Mag. 53(3), 54\u201360 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Woo, M., Brumley, D.: Program-adaptive mutational fuzzing. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 725\u2013741 (2015)","DOI":"10.1109\/SP.2015.50"},{"issue":"5","key":"4_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/52.536462","volume":"13","author":"DM Cohen","year":"1996","unstructured":"Cohen, D.M., Dalal, S.R., Parelius, J., Patton, G.C.: The combinatorial design approach to automatic test generation. IEEE Softw. 13(5), 83\u201388 (1996)","journal-title":"IEEE Softw."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Dixit, V.H., Doup\u00e9, A., Shoshitaishvili, Y., Zhao, Z., Ahn, G.J.: AIM-SDN: attacking information mismanagement in SDN-datastores. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 664\u2013676 (2018)","DOI":"10.1145\/3243734.3243799"},{"key":"4_CR10","unstructured":"Durner, R., Kellerer, W.: The cost of security in the SDN control plane. In: Proceedings of the ACM CoNEXT Student Workshop (2015)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Flauzac, O., Gonz\u00e1lez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: Proceedings of the IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 688\u2013693 (2015)","DOI":"10.1109\/WAINA.2015.110"},{"key":"4_CR12","unstructured":"Hocevar, S.: zzuf. \nhttps:\/\/github.com\/samhocevar\/zzuf"},{"key":"4_CR13","unstructured":"Holler, C., Herzig, K., Zeller, A.: Fuzzing with code fragments. In: Proceedings of the USENIX Security Symposium, pp. 445\u2013458 (2012)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Householder, A.D., Foote, J.M.: Probability-based parameter selection for black-box fuzz testing. Technical report, CMU\/SEI-2012-TN-019, CERT (2012)","DOI":"10.21236\/ADA610472"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-66332-6_14","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"S Jero","year":"2017","unstructured":"Jero, S., Bu, X., Nita-Rotaru, C., Okhravi, H., Skowyra, R., Fahmy, S.: BEADS: automated attack discovery in openflow-based SDN systems. In: Dacier, M., Bailey, M., Polychronakis, M., Antonakakis, M. (eds.) RAID 2017. LNCS, vol. 10453, pp. 311\u2013333. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66332-6_14"},{"key":"4_CR16","unstructured":"Kazemian, P., Chang, M., Zeng, H., Varghese, G., McKeown, N., Whyte, S.: Real time network policy checking using header space analysis. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, pp. 99\u2013111 (2013)"},{"key":"4_CR17","unstructured":"Kl\u00f6ti, R., Kotronis, V., Smith, P.: Openflow: a security analysis. In: Proceedings of the IEEE International Conference on Network Protocols, pp. 1\u20136 (2016)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 55\u201360 (2013)","DOI":"10.1145\/2491185.2491199"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Lee, S., Yoon, C., Lee, C., Shin, S., Yegneswaran, V., Porras, P.A.: DELTA: a security assessment framework for software-defined networks. In: Proceedings of the Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23457"},{"key":"4_CR21","unstructured":"Lei, X., Huang, J., Hong, S., Zhang, J., Gu, G.: Attacking the brain: races in the SDN control plane. In: Proceedings of the USENIX Security Symposium, pp. 451\u2013468 (2017)"},{"issue":"12","key":"4_CR22","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Ojo, M., Adami, D., Giordano, S.: A SDN-IoT architecture with NFV implementation. In: Proceedings of the IEEE Globecom Workshops, pp. 1\u20136 (2016)","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"4_CR24","unstructured":"Pickett, G.: Abusing software defined networks. In: Proceedings of the Black Hat EU (2014)"},{"key":"4_CR25","unstructured":"Pickett, G.: Staying persistent in software defined networks. Black Hat Briefings (2015)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security enforcement kernel for openflow networks. In: Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 121\u2013126 (2012)","DOI":"10.1145\/2342441.2342466"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: VUzzer: application-aware evolutionary fuzzing. In: Proceedings of the Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"4_CR28","unstructured":"Rebert, A., Cha, S.K., Avgerinos, T., Foote, J., Warren, D., Grieco, G., Brumley, D.: Optimizing seed selection for fuzzing. In: Proceedings of the USENIX Security Symposium, pp. 861\u2013875 (2014)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"R\u00fcckert, J., Bifulco, R., Rizwan-Ul-Haq, M., Kolbe, H.J., Hausheer, D.: Flexible traffic management in broadband access networks using software defined networking. In: Proceedings of the IEEE Network Operations and Management Symposium, pp. 1\u20138 (2014)","DOI":"10.1109\/NOMS.2014.6838322"},{"issue":"4","key":"4_CR30","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/2740070.2626304","volume":"44","author":"C Scott","year":"2015","unstructured":"Scott, C., et al.: Troubleshooting blackbox SDN control software with minimal causal sequences. ACM SIGCOMM Comput. Commun. Rev. 44(4), 395\u2013406 (2015)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1002\/ett.2915","volume":"26","author":"R Trivisonno","year":"2015","unstructured":"Trivisonno, R., Guerzoni, R., Vaishnavi, I., Soldani, D.: SDN-based 5G mobile networks: architecture, functions, procedures and backward compatibility. Trans. Emerg. Telecommun. Technol. 26(1), 82\u201392 (2015)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"6","key":"4_CR32","doi-asserted-by":"publisher","first-page":"3514","DOI":"10.1109\/TNET.2017.2748159","volume":"25","author":"C Yoon","year":"2017","unstructured":"Yoon, C., et al.: Flow wars: systemizing the attack surface and defenses in software-defined networks. IEEE\/ACM Trans. Netw. 25(6), 3514\u20133530 (2017)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"4_CR33","unstructured":"Zalewski, M.: American Fuzzy Lop. \nhttp:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Zeller, A.: Yesterday, my program worked. Today, it does not. Why? In: Proceedings of the ACM SIGSOFT Software Engineering Notes, pp. 253\u2013267 (1999)","DOI":"10.1007\/3-540-48166-4_16"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39303-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T04:03:41Z","timestamp":1579838621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39303-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030393021","9783030393038"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39303-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}