{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:21:51Z","timestamp":1774369311715,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T00:00:00Z","timestamp":1680480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T00:00:00Z","timestamp":1680480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00474-1","type":"journal-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T11:05:23Z","timestamp":1680519923000},"page":"249-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptographic protocol conformance testing based on domain-specific state machine"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4410-2565","authenticated-orcid":false,"given":"Sergey","family":"Prokopev","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,3]]},"reference":[{"key":"474_CR1","unstructured":"Bozic, J., Marsso, L., Mateescu, R., Wotawa, F.: A formal TLS handshake model in LNT. In: Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, MARS\/VPT@ETAPS 2018, and Sixth International Workshop on Verification and Program Transformation, Thessaloniki, Greece, 20th April 2018"},{"key":"474_CR2","unstructured":"ABZ Conference. https:\/\/abz-conf.org\/"},{"key":"474_CR3","unstructured":"Nikeshin A.V., Pakulin N.V., Shnitman. V.Z.: Conformance test suite for implementations of the security protocol suite IPsec v2. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2010;18. (In Russ.)"},{"key":"474_CR4","doi-asserted-by":"publisher","unstructured":"Nikeshin A.V., Pakulin, N.V., Shnitman. V.Z.: Test suite development for verification of TLS security protocol. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2012;23. (In Russ.) https:\/\/doi.org\/10.15514\/ISPRAS-2012-23-22","DOI":"10.15514\/ISPRAS-2012-23-22"},{"key":"474_CR5","doi-asserted-by":"crossref","unstructured":"McMillan, K.L., Zuck, L.D.: Formal specification and testing of QUIC. In: Proceedings of the ACM Special Interest Group on Data Communication, SIGCOMM 2019, Beijing, China, August 19\u201323, 2019. pp. 227\u2013240 (2019)","DOI":"10.1145\/3341302.3342087"},{"key":"474_CR6","doi-asserted-by":"publisher","unstructured":"Rozenzweig, D., Runje, D.: The Cryptographic Abstract Machine. ASM 2004: Abstract State Machines 2004. Advances in Theory and Practice. pp 202\u2013217. https:\/\/doi.org\/10.1007\/978-3-540-24773-9_15.","DOI":"10.1007\/978-3-540-24773-9_15"},{"key":"474_CR7","doi-asserted-by":"crossref","unstructured":"Aizatulin, M., Gordon, A., Jurjens, J.: Extracting and verifying cryptographic models from C protocol code by symbolic execution. In: Proc. of the 18th ACM Conference on Computer and Communications Security (CCS\u201911), Chicago, IL, USA, pages 331\u2013340. ACM, October 2011","DOI":"10.1145\/2046707.2046745"},{"key":"474_CR8","doi-asserted-by":"crossref","unstructured":"Braghin, C., Lilli, M., Riccobene, E.: Towards ASM-Based Automated Formal Verification of Security Protocols. In: Proceedings of 8th International Conference, ABZ 2021 Ulm, Germany, June 9\u201311, 2021","DOI":"10.1007\/978-3-030-77543-8_2"},{"key":"474_CR9","doi-asserted-by":"publisher","unstructured":"Gagliardi, E., Levillain, O.: Analysis of QUIC session establishment and its implementations. In: WISTP 2019: IFIP International Conference on Information Security Theory and Practice, Dec 2019, Paris, France. pp.169\u2013184. https:\/\/doi.org\/10.1007\/978-3-030-41702-4_11","DOI":"10.1007\/978-3-030-41702-4_11"},{"issue":"11","key":"474_CR10","first-page":"1050","volume":"7","author":"A Gargantini","year":"2001","unstructured":"Gargantini, A., Riccobene, E.: ASM-based testing: coverage criteria and automatic test sequence generation. J. Univ. Comput. Sci. 7(11), 1050\u20131067 (2001)","journal-title":"J. Univ. Comput. Sci."},{"key":"474_CR11","unstructured":"de Ruiter, J., Poll, E.: Protocol state fuzzing of TLS implementations. In: USENIX Security Symposium, 2015, pp. 193\u2013206"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00474-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00474-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00474-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:11:37Z","timestamp":1713463897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00474-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,3]]},"references-count":11,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["474"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00474-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,3]]},"assertion":[{"value":"19 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}