{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T19:37:46Z","timestamp":1769715466541,"version":"3.49.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,16]]},"DOI":"10.1109\/ase63991.2025.00105","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:38Z","timestamp":1769633678000},"page":"1221-1233","source":"Crossref","is-referenced-by-count":0,"title":["RFCAudit: AI Agent for Auditing Protocol Implementations Against RFC Specifications"],"prefix":"10.1109","author":[{"given":"Mingwei","family":"Zheng","sequence":"first","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]},{"given":"Chengpeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]},{"given":"Xuwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]},{"given":"Jinyao","family":"Guo","sequence":"additional","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]},{"given":"Shiwei","family":"Feng","sequence":"additional","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University,Department of Computer Science,West Lafayette,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cve-2020-1472","year":"2020"},{"key":"ref2","article-title":"Netlogon remote protocol","year":"2024"},{"key":"ref3","article-title":"The meaning of memory safety","volume-title":"CoRR","volume":"abs\/1705.07354","author":"de Amorim","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510082"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695530"},{"key":"ref6","article-title":"Intentest: Stress testing for intent integrity in api-calling LLM agents","volume-title":"CoRR","volume":"abs\/2506.07524","author":"Feng","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3715748"},{"key":"ref8","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation","author":"Cadar"},{"key":"ref9","first-page":"181","article-title":"Symbolic execution with SymCC: Don\u2019t interpret, compile!","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Poeplau"},{"key":"ref10","first-page":"745","article-title":"QSYM : A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Yun"},{"key":"ref11","article-title":"SFA-Miner: Mining path-sensitive api usage patterns via symbolic finite automata","volume-title":"The IEEE Symposium on Security and Privacy","author":"Jiang"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534403"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3656400"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180178"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2024.24556","article-title":"Large language model guided protocol fuzzing","volume-title":"31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024","author":"Meng"},{"key":"ref16","article-title":"From one thousand pages of specification to unveiling hidden bugs: Large language model assisted fuzzing of matter iot devices","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","author":"Ma"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639172"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3649854"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icst53961.2022.00035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427662"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.ic.2007.05.007","article-title":"Rule-based static analysis of network protocol implementations","volume-title":"Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006","author":"Udrea"},{"key":"ref22","first-page":"155","article-title":"Model checking large network protocol implementations","volume-title":"1st Symposium on Networked Systems Design and Implementation (NSDI 2004), March 29-31, 2004, San Francisco, California, USA, Proceedings","author":"Musuvathi"},{"key":"ref23","article-title":"The artifact of RFCAudit","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575731"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icst46399.2020.00062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616614"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968063"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3728955"},{"key":"ref31","first-page":"8697","article-title":"Locagent: Graph-guided LLM agents for code localization","volume-title":"Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), ACL 2025, Vienna, Austria, July 27 - August 1, 2025","author":"Chen"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3715754"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.18653\/v1\/2024.findings-acl.91","article-title":"CriticBench: Benchmarking LLMs for critique-correct reasoning","volume-title":"Findings of the Association for Computational Linguistics: ACL 2024","author":"Lin","year":"2024"},{"key":"ref34","article-title":"Autogen: Enabling next-gen LLM applications via multi-agent conversation","volume-title":"ICLR 2024 Workshop on Large Language Model (LLM) Agents","author":"Wu"},{"key":"ref35","article-title":"Claude 3.5 sonnet","year":"2025"},{"key":"ref36","article-title":"Tree-sitter"},{"key":"ref37","article-title":"The frrouting protocol suite","year":"2024"},{"key":"ref38","article-title":"lwip - a lightweight tcp\/ip stack","year":"2025"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/spw67851.2025.00009"},{"key":"ref40","article-title":"Swe-bench pro: Can ai agents solve long-horizon software engineering tasks?","author":"Deng","year":"2025"},{"key":"ref41","article-title":"Impact of large language models on generating software specifications","volume-title":"CoRR","volume":"abs\/2306.03324","author":"Xie","year":"2023"},{"key":"ref42","article-title":"Core: Benchmarking LLMs\u2019 code reasoning capabilities through static analysis tasks","volume-title":"The Thirty-ninth Annual Conference on Neural Information Processing Systems Datasets and Benchmarks Track","author":"Xie"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ase51524.2021.9678600"},{"key":"ref44","article-title":"Boofuzz","author":"Pereyda","year":"2023"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00211"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607222"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3660816"},{"key":"ref49","article-title":"When threads meet interrupts: Effective static detection of interrupt-based deadlocks in linux","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","author":"Ye"},{"key":"ref50","article-title":"Llm-assisted static analysis for detecting security vulnerabilities","volume-title":"CoRR","volume":"abs\/2405.17238","author":"Li","year":"2024"},{"key":"ref51","article-title":"Knighter: Transforming static analysis with llm-synthesized checkers","volume-title":"CoRR","volume":"abs\/2503.09002","author":"Yang","year":"2025"},{"key":"ref52","first-page":"3790","article-title":"Sanitizing large language models in bug detection with data-flow","volume-title":"Findings of the Association for Computational Linguistics: EMNLP 2024, Miami, Florida, USA, November 12-16, 2024","author":"Wang"},{"key":"ref53","article-title":"LLMDFA: analyzing dataflow in code with large language models","volume-title":"Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024","author":"Wang","year":"2024"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3649828"},{"key":"ref55","article-title":"Repoaudit: An autonomous llm-agent for repository-level code auditing","volume-title":"CoRR","volume":"abs\/2501.18160","author":"Guo","year":"2025"}],"event":{"name":"2025 40th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2025,11,16]]},"end":{"date-parts":[[2025,11,20]]}},"container-title":["2025 40th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11334056\/11334198\/11334718.pdf?arnumber=11334718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T09:06:53Z","timestamp":1769677613000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11334718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ase63991.2025.00105","relation":{},"subject":[],"published":{"date-parts":[[2025,11,16]]}}}