{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:32:20Z","timestamp":1725654740253},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icccn.2011.6005945","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:33:30Z","timestamp":1315856010000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Rule-Based Verification of Network Protocol Implementations Using Symbolic Execution"],"prefix":"10.1109","author":[{"given":"JaeSeung","family":"Song","sequence":"first","affiliation":[]},{"given":"Tiejun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DNS-Based Service Discovery","year":"2010","author":"cheshire","key":"19"},{"key":"17","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"0","journal-title":"Proc of Network and Distr System Sec Symp 2008"},{"journal-title":"Multicast DNS","year":"2010","author":"cheshire","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90014-4"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"13","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","author":"cadar","year":"0","journal-title":"Proc of the 8th USENIX Conf on Op Sys Design and Impl 2008"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094685"},{"key":"12","article-title":"Towards Automated Verification of Autonomous Networks: A Case Study in Self-Configuration","author":"song","year":"0","journal-title":"8th IEEE Int Conf On Pervasive Comp and Comm Workshops Apr 2010"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619264"},{"key":"20","article-title":"Key Words for Use in RFCs to Indicate Requirement Levels","author":"bradner","year":"1997","journal-title":"RFC 2119"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"journal-title":"libpcap","year":"0","key":"23"},{"key":"24","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc of the 13th USENIX Conf on System Admin"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2004.1353000"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247620"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/4\/2\/004"},{"journal-title":"Black Ops 2008 Its the End of the Cache As We Know It","year":"0","author":"kaminsky","key":"3"},{"key":"2","article-title":"D3S: Debugging Deployed Distributed Systems","author":"liu","year":"0","journal-title":"Proc of the 5th USENIX Symp on NSDI 2008"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.05.007"},{"key":"1","article-title":"The Internet Standards Process","author":"bradner","year":"1996","journal-title":"RFC 2026"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676929"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.20"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1145735.1145737"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"}],"event":{"name":"2011 20th International Conference on Computer Communications and Networks - ICCCN 2011","start":{"date-parts":[[2011,7,31]]},"location":"Lahaina, HI, USA","end":{"date-parts":[[2011,8,4]]}},"container-title":["2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005186\/6005707\/06005945.pdf?arnumber=6005945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:41:50Z","timestamp":1490085710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6005945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icccn.2011.6005945","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}