{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:25:22Z","timestamp":1740101122502,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N68335-19-C-0633"],"award-info":[{"award-number":["N68335-19-C-0633"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1562485"],"award-info":[{"award-number":["CNS-1562485"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.9947243","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T20:49:54Z","timestamp":1668804594000},"page":"245-253","source":"Crossref","is-referenced-by-count":0,"title":["HallMonitor: A Framework for Identifying Network Policy Violations in Software"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Olszewski","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Weidong","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Sandeep","family":"Sathyanarayana","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Kevin","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Automated program re-pair through the evolution of assembly code","author":"schulte","year":"2010","journal-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering Association for Computing Machinery"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227184"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106269"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"ref37","article-title":"Automated concurrency-bug fixing","author":"jin","year":"2012","journal-title":"10th USENIX Symposium on Operating Systems Design and Imple-mentation (OSDI 12)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72582-2_31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345665"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"journal-title":"IANA Service Name and Transport Protocol Port Number Registry","year":"0","key":"ref13"},{"key":"ref14","article-title":"LIGHTBLUE: Automatic profile-aware debloating of bluetooth stacks","author":"wu","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21) USENIX Association"},{"journal-title":"IANA Internet control message protocol (ICMP) parameters","year":"1981","key":"ref15"},{"journal-title":"Nginx","year":"0","key":"ref16"},{"journal-title":"Curl","year":"0","key":"ref17"},{"journal-title":"Snort community rules","year":"0","key":"ref18"},{"key":"ref19","article-title":"An approach to source-code plagiarism detection and investigation using latent semantic analysis","author":"cosma","year":"2011","journal-title":"IEEE Transactions on Computers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"ref4","article-title":"Razor: A framework for post-deployment software debloating","author":"qian","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref27","article-title":"Genprog: A generic method for automatic software repair","author":"le goues","year":"2011","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00029"},{"key":"ref6","article-title":"Less is more: Quan-tifying the security benefits of debloating web applications","author":"azad","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359764"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.146"},{"key":"ref9","article-title":"Temporal system call specialization for attack surface reduction","author":"ghavamnia","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref1","article-title":"Breaking payloads with runtime code stripping and image freezing","author":"mulliner","year":"2015","journal-title":"Black Hat USA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3273045.3273048"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103634"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.71"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.144"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/09947243.pdf?arnumber=9947243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:56:56Z","timestamp":1670875016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9947243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.9947243","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}