{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:18:51Z","timestamp":1725715131183},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642367564"},{"type":"electronic","value":"9783642367571"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36757-1_6","type":"book-chapter","created":{"date-parts":[[2013,2,7]],"date-time":"2013-02-07T00:07:21Z","timestamp":1360195641000},"page":"88-104","source":"Crossref","is-referenced-by-count":10,"title":["Behavioral Fuzzing Operators for UML Sequence Diagrams"],"prefix":"10.1007","author":[{"given":"Martin","family":"Schneider","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Gro\u00dfmann","sequence":"additional","affiliation":[]},{"given":"Nikolay","family":"Tcholtchev","sequence":"additional","affiliation":[]},{"given":"Ina","family":"Schieferdecker","sequence":"additional","affiliation":[]},{"given":"Andrej","family":"Pietschker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bekrar, C., Groz, R., Mounier, L.: Finding Software Vulnerabilities by Smart Fuzzing. In: Fourth IEEE International Conference on Software Testing, Verification and Validation (ICST 2011), pp. 427\u2013430. IEEE Computer Society (2011)","DOI":"10.1109\/ICST.2011.48"},{"issue":"12","key":"6_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"B. Miller","year":"2000","unstructured":"Miller, B., Fredriksen, L., So, B.: An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM\u00a033(12), 32\u201334 (2000)","journal-title":"Communications of the ACM"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1228291.1228308","volume":"41","author":"B.P. Miller","year":"2007","unstructured":"Miller, B.P., Cooksey, G., Moore, F.: An Empirical Study of the Robustness of MacOS Applications Using Random Testing. SIGOPS Operating Systems Review\u00a041(1), 78\u201386 (2007)","journal-title":"SIGOPS Operating Systems Review"},{"key":"6_CR4","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A. Takanen","year":"2008","unstructured":"Takanen, A., DeMott, J., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance. Artech House, Boston (2008)"},{"key":"6_CR5","unstructured":"Uusitalo, I. (ed.): Review of Security Testing Tools. Project deliverable D1.WP3. DIAMONDS Consortium (2011) \n                    \n                      http:\/\/www.itea2-diamonds.org\/_docs\/D1_WP3_T1_v11_FINAL_Review_of_Security_Testing_Tools.pdf"},{"key":"6_CR6","unstructured":"DeMott, J., Enbody, R., Punch, W.: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing. Black Hat (2007), \n                    \n                      http:\/\/www.blackhat.com\/presentations\/bh-usa-07\/DeMott_Enbody_and_Punch\/Presentation\/bh-usa-07-demott_enbody_and_punch.pdf"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hsu, Y., Shu, G., Lee, D.: A Model-based Approach to Security Flaw Detection of Network Protocol Implementations. In: IEEE International Conference on Network Protocols (ICNP 2008), pp. 114\u2013123. IEEE Conference Publications (2008)","DOI":"10.1109\/ICNP.2008.4697030"},{"key":"6_CR8","unstructured":"Takanen, A.: Fuzzing \u2013 the Past, the Present and the Future. In: Actes du 7\u00e8me Symposium sur la S\u00e9urit\u00e9 des Technologies de l\u2019Information et des Communications (2009), \n                    \n                      http:\/\/actes.sstic.org\/SSTIC09\/Fuzzing-the_Past-the_Present_and_the_Future\/SSTIC09-article-A-Takanen-Fuzzing-the_Past-the_Present_and_the_Future.pdf"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Kitagawa, T., Hanaoka, M., Kono, K.: AspFuzz: A State-aware Protocol Fuzzer based on Application-layer Protocols. In: IEEE Symposium on Computers and Communications (ISCC 2010), pp. 202\u2013208. IEEE Conference Publications (2010)","DOI":"10.1109\/ISCC.2010.5546704"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11836810_25","volume-title":"Information Security","author":"G. Banks","year":"2006","unstructured":"Banks, G., Cova, M., Felmetsger, V., Almeroth, K.C., Kemmerer, R.A., Vigna, G.: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 343\u2013358. Springer, Heidelberg (2006)"},{"key":"6_CR11","unstructured":"Viide, J., et al.: Experiences with Model Inference Assisted Fuzzing. In: Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies (WOOT 2008). USENIX Association (2008)"},{"key":"6_CR12","unstructured":"Forrester, J.E., Miller, B.P.: An Empirical Study of the Robustness of Windows NT Applications Using Random Testing. In: Proceedings of the 4th Conference on USENIX Windows Systems Symposium (WSS 2000), p. 6. USENIX Association (2000)"},{"key":"6_CR13","unstructured":"Takanen, A., DeMott, J., Miller, C.: Software Security Assessment through Specification Mutations and Fault Injection. In: Communications and Multimedia Security Issues of the New Century, IFIP Advances in Information and Communication Technology, vol.\u00a064, Springer (2001)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Abdelnur, H., Festor, O., State, R.: Kif \u2013 A Stateful SIP Fuzzer. In: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm 2007), pp. 47\u201356. ACM Press (2007)","DOI":"10.1145\/1326304.1326313"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-13986-4_7","volume-title":"Mechanisms for Autonomous Management of Networks and Services","author":"S. Becker","year":"2010","unstructured":"Becker, S., Abdelnur, H., State, R., Engel, T.: An Autonomic Testing Framework for IPv6 Configuration Protocols. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol.\u00a06155, pp. 65\u201376. Springer, Heidelberg (2010)"},{"key":"6_CR16","unstructured":"Object Management Grouo: Unified Modeling Language, Superstructure v2.4.1, formal\/2011-08-06 (2011), \n                    \n                      http:\/\/www.omg.org\/spec\/UML\/2.4.1\/Superstructure\/PDF"},{"key":"6_CR17","unstructured":"Denis Howe: off-by-one error. In:\u00a0Free On-Line Dictionary of Computing, \n                    \n                      http:\/\/foldoc.org\/off-by-one+errors"}],"container-title":["Lecture Notes in Computer Science","System Analysis and Modeling: Theory and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36757-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T23:24:08Z","timestamp":1557530648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36757-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642367564","9783642367571"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36757-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}