{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:37:53Z","timestamp":1775054273420,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319681665","type":"print"},{"value":"9783319681672","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68167-2_24","type":"book-chapter","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T23:50:53Z","timestamp":1506383453000},"page":"363-379","source":"Crossref","is-referenced-by-count":3,"title":["A Language-Theoretic View on Network Protocols"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Ganty","sequence":"first","affiliation":[]},{"given":"Boris","family":"K\u00f6pf","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Valero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"24_CR1","unstructured":"Internet Protocol. RFC 791 (Proposed Standard), September 1981"},{"key":"24_CR2","unstructured":"Bangert, J., Zeldovich, N.: Nail: a practical tool for parsing and generating data formats. In: 11th USENIX Symposium on Operating Systems Design and Implementation (2014)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bernardy, J.-P., Jansson, P.: Certified context-free parsing: a formalisation of valiant\u2019s algorithm in agda. Logical Methods Comput. Sci. 12(2) (2016)","DOI":"10.2168\/LMCS-12(2:6)2016"},{"key":"24_CR4","unstructured":"Borisov, N., Brumley, D., Wang, H.J., Dunagan, J., Joshi, P., Guo, C.: Generic application-level protocol analyzer and its language. In: NDSS 2007 (2007)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Brough, T.: Groups with poly-context-free word problem. Groups Complexity Cryptol. 6(1) (2014)","DOI":"10.1515\/gcc-2014-0002"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Crocker, P.D. (ed.): Brandenburg InternetWorking. Augmented BNF for Syntax Specifications: ABNF. RFC 5234 (Proposed Standard), January 2008","DOI":"10.17487\/rfc5234"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-04444-1_14","volume-title":"Computer Security \u2013 ESORICS 2009","author":"D Davidson","year":"2009","unstructured":"Davidson, D., Smith, R., Doyle, N., Jha, S.: Protocol normalization using attribute grammars. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 216\u2013231. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04444-1_14"},{"key":"24_CR8","unstructured":"Faronov, V.: HTTPolice (2017). https:\/\/github.com\/vfaronov\/httpolice"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Fielding, R., Reschke, J.: Hypertext Transfer Protocol (HTTP\/1.1): Message Syntax and Routing. RFC 7230 (Proposed Standard), June 2014","DOI":"10.17487\/rfc7230"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Filmus, Y.: Lower bounds for context-free grammars. Inf. Process. Lett. 111(18) (2011)","DOI":"10.1016\/j.ipl.2011.06.006"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Firsov, D., Uustalu, T.: Certified CYK parsing of context-free languages. J. Logical Algebraic Methods Program. 83(5\u20136) (2014)","DOI":"10.1016\/j.jlamp.2014.09.002"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Freed, N., Borenstein, N.: Multipurpose internet mail extensions (MIME). RFC 1341 (Proposed Standard), November 1996","DOI":"10.17487\/rfc2046"},{"key":"24_CR13","unstructured":"Graham-Cumming, J.: Inside shellshock: How hackers are using it to exploit systems. https:\/\/blog.cloudflare.com\/inside-shellshock\/"},{"key":"24_CR14","unstructured":"Lastpass security updates. https:\/\/blog.lastpass.com\/2016\/07\/lastpass-security-updates.html\/"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Latteux, M.: Intersections de langages alg\u00e9briques born\u00e9s. Acta Informatica 11(3) (1979)","DOI":"10.1007\/BF00289069"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Li, Z., Xia, G., Gao, H., Tang, Y., Chen, Y., Liu, B., Jiang, J., Lv, Y.: NetShield: massive semantics-based vulnerability signature matching for high-speed networks. In: ACM SIGCOMM 2010 (2010)","DOI":"10.1145\/1851182.1851216"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Liu, L.Y., Weiner, P.: An infinite hierarchy of intersections of context-free languages. Math. Syst. Theory 7(2) (1973)","DOI":"10.1007\/BF01762237"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Meiners, C.R., Norige, E., Liu, A.X., Torng, E.: Flowsifter: a counting automata approach to layer 7 field extraction for deep flow inspection. In: IEEE INFOCOM 2012 (2012)","DOI":"10.1109\/INFCOM.2012.6195547"},{"key":"24_CR19","unstructured":"Microsoft releases security advisory 2953095. https:\/\/technet.microsoft.com\/library\/security\/2953095"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain Names - Implementation and Specification. RFC 1035 (Proposed Standard), November 1987","DOI":"10.17487\/rfc1035"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Pang, R., Paxson, V., Sommer, R., Peterson, L.L.: Binpac: a Yacc for writing application protocol parsers. In: ACM SIGCOMM IMC 2006 (2006)","DOI":"10.1145\/1177080.1177119"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Postel, J.: User Datagram Protocol. RFC 768 (Proposed Standard), August 1980","DOI":"10.17487\/rfc0768"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), June 2002","DOI":"10.17487\/rfc3261"},{"key":"24_CR24","unstructured":"Valero, P.: HTTPValidator, April 2017. https:\/\/github.com\/pevalme\/HTTPValidator"},{"key":"24_CR25","unstructured":"Ganty, P., K\u00f6pf, B., Valero, P.: A Language-theoretic View on Network Protocols (2016). (long version). Pre-print arXiv: https:\/\/arxiv.org\/abs\/1610.07198"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68167-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:38:34Z","timestamp":1570131514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68167-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681665","9783319681672"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68167-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}