{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:12:35Z","timestamp":1742911955638,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031647659"},{"type":"electronic","value":"9783031647666"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64766-6_27","type":"book-chapter","created":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T19:01:44Z","timestamp":1719774104000},"page":"272-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A PFCP Protocol Fuzz Testing Framework Integrating Data Mutation Strategies and State Transition Algorithms"],"prefix":"10.1007","author":[{"given":"Xiaoyang","family":"Feng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Wenxiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zixuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,1]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agiwal","year":"2016","unstructured":"Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 18(3), 1617\u20131655 (2016). https:\/\/doi.org\/10.1109\/COMST.2016.2532458","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"27_CR2","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1186\/s13638-022-02204-5","volume":"2022","author":"G Amponis","year":"2022","unstructured":"Amponis, G., et al.: Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP J. Wirel. Commun. Netw. 2022(1), 124 (2022). https:\/\/doi.org\/10.1186\/s13638-022-02204-5","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"doi-asserted-by":"publisher","unstructured":"Ananda, T.K., Simran, G.T., Sukumara, T., Sasikala, D., Kumar, R.P.: Robustness evaluation of cyber physical systems through network protocol fuzzing. In: 2019 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ICACCE46606.2019.9079995","key":"27_CR3","DOI":"10.1109\/ICACCE46606.2019.9079995"},{"issue":"6","key":"27_CR4","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews, J.G., et al.: What will 5G be? IEEE J. Sel. Areas Commun. 32(6), 1065\u20131082 (2014). https:\/\/doi.org\/10.1109\/JSAC.2014.2328098","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11836810_25","volume-title":"Information security","author":"G Banks","year":"2006","unstructured":"Banks, G., Cova, M., Felmetsger, V., Almeroth, K., Kemmerer, R., Vigna, G.: SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 343\u2013358. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11836810_25"},{"doi-asserted-by":"publisher","unstructured":"Biao, W., Chaojing, T., Bin, Z.: FFUZZ: a fast fuzzing test method for stateful network protocol implementation. Inn: 2021 2nd International Conference on Computer Communication and Network Security (CCNS), pp. 75\u201379 (2021). https:\/\/doi.org\/10.1109\/CCNS53852.2021.00023","key":"27_CR6","DOI":"10.1109\/CCNS53852.2021.00023"},{"doi-asserted-by":"publisher","unstructured":"Cao, Y., Chen, Y., Zhou, W.: Detection of PFCP protocol based on fuzz method. In: 2022 2nd International Conference on Computer, Control and Robotics (ICCCR), pp. 207\u2013211 (2022). https:\/\/doi.org\/10.1109\/ICCCR54399.2022.9790271","key":"27_CR7","DOI":"10.1109\/ICCCR54399.2022.9790271"},{"issue":"1","key":"27_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/JIOT.2019.2948888","volume":"7","author":"L Chettri","year":"2020","unstructured":"Chettri, L., Bera, R.: A comprehensive survey on internet of things (IoT) toward 5G wireless systems. IEEE Internet Things J. 7(1), 16\u201332 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2948888","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"publisher","unstructured":"Fioraldi, A., Mantovani, A., Maier, D., Balzarotti, D.: Dissecting American fuzzy lop: a FuzzBench evaluation. ACM Trans. Softw. Eng. Methodol. 32(2) (2023). https:\/\/doi.org\/10.1145\/3580596","key":"27_CR9","DOI":"10.1145\/3580596"},{"unstructured":"Gorbunov, S., Rosenbloom, A.: AutoFuzz: automated network protocol fuzzing framework (2010). https:\/\/api.semanticscholar.org\/CorpusID:18430752","key":"27_CR10"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206\u20131232 (2015). https:\/\/doi.org\/10.1109\/ACCESS.2015.2461602","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Han, X., Wen, Q., Zhang, Z.: A mutation-based fuzz testing approach for network protocol vulnerability detection. In: Proceedings of 2012 2nd International Conference on Computer Science and Network Technology, pp. 1018\u20131022 (2012). https:\/\/doi.org\/10.1109\/ICCSNT.2012.6526099","key":"27_CR12","DOI":"10.1109\/ICCSNT.2012.6526099"},{"doi-asserted-by":"publisher","unstructured":"Hu, Z., Pan, Z.: A systematic review of network protocol fuzzing techniques. In: 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), pp. 1000\u20131005 (2021). https:\/\/doi.org\/10.1109\/IMCEC51613.2021.9482063","key":"27_CR13","DOI":"10.1109\/IMCEC51613.2021.9482063"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","volume":"10","author":"S Li","year":"2018","unstructured":"Li, S., Xu, L.D., Zhao, S.: 5G internet of things: a survey. J. Ind. Inf. Integr. 10, 1\u20139 (2018). https:\/\/doi.org\/10.1016\/j.jii.2018.01.005","journal-title":"J. Ind. Inf. Integr."},{"doi-asserted-by":"publisher","unstructured":"Morocho Cayamcela, M.E., Lim, W.: Artificial intelligence in 5G technology: a survey. In: 2018 International Conference on Information and Communication Technology Convergence (ICTC), pp. 860\u2013865 (2018). https:\/\/doi.org\/10.1109\/ICTC.2018.8539642","key":"27_CR15","DOI":"10.1109\/ICTC.2018.8539642"},{"doi-asserted-by":"publisher","unstructured":"Pham, V.-T., B\u00f6hme, M., Roychoudhury, A.: AFLNET: a greybox fuzzer for network protocols. In: 2020 IEEE 13th International Conference on Software Testing, Validation and verification (ICST), pp. 460\u2013465 (2020). https:\/\/doi.org\/10.1109\/ICST46399.2020.00062","key":"27_CR16","DOI":"10.1109\/ICST46399.2020.00062"},{"issue":"5","key":"27_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2016.7470940","volume":"54","author":"P Rost","year":"2016","unstructured":"Rost, P., et al.: Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84\u201391 (2016). https:\/\/doi.org\/10.1109\/MCOM.2016.7470940","journal-title":"IEEE Commun. Mag."},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"18490","DOI":"10.1109\/ACCESS.2019.2895025","volume":"7","author":"C Song","year":"2019","unstructured":"Song, C., Yu, B., Zhou, X., Yang, Q.: SPFuzz: a hierarchical scheduling framework for stateful network protocol fuzzing. IEEE Access 7, 18490\u201318499 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2895025","journal-title":"IEEE Access"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"198668","DOI":"10.1109\/ACCESS.2020.3025037","volume":"8","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Chen, Z., Gan, S., Wang, X.: SGPFuzzer: a state-driven smart graybox protocol fuzzer for network protocol implementations. IEEE Access 8, 198668\u2013198678 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3025037","journal-title":"IEEE Access"},{"issue":"2","key":"27_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/JETCAS.2020.3000103","volume":"10","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Ueng, Y.-L., Studer, C., Burg, A.: Artificial intelligence for 5G and beyond 5G: implementations, algorithms, and optimizations. IEEE J. Emerg. Sel. Top. Circuits Syst. 10(2), 149\u2013163 (2020). https:\/\/doi.org\/10.1109\/JETCAS.2020.3000103","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64766-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T19:18:39Z","timestamp":1719775119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64766-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031647659","9783031647666"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64766-6_27","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2024\/conf-officers.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}