{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:40:07Z","timestamp":1756532407361,"version":"3.44.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133817","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Symbolic Execution for Hardware TCP\/IP Stack based on AMD Vitis HLS"],"prefix":"10.1109","author":[{"given":"Nianhang","family":"Hu","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln,School of Computing"}]},{"given":"Tate","family":"Koziol","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln,School of Computing"}]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln,School of Computing"}]},{"given":"Lisong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln,School of Computing"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00040"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2019.00053"},{"article-title":"Floem: a programming system for NIC-accelerated network applications","volume-title":"Proceedings of USENIX OSDI","author":"Phothilimthana","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/fccm.2015.12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2019.00053"},{"article-title":"Enabling programmable transport protocols in high-speed NICs","volume-title":"Proceedings of USENIX NSDI","author":"Arashloo","key":"ref6"},{"article-title":"AccelTCP: Accelerating network applications with stateful TCP offloading","volume-title":"Proceedings of USENIX NSDI","author":"Moon","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850757"},{"article-title":"TCP on FPGA made practical and fast","year":"2015","author":"Riddoch","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3532577.3532604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098833"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP61940.2024.10858512"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737390"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791235"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323977"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"article-title":"Analyzing protocol implementations for interoperability","volume-title":"Proceedings of USENIX NSDI","author":"Pedrosa","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018440"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3530775"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2110592"},{"article-title":"KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proceedings of USENIX OSDI","author":"Cadar","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.34727\/2023\/isbn.978-3-85448-060-0_19"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3066560"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2676549"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITC50571.2021.00031"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00071"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.107"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3219763.3219764"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357082"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST56390.2022.10022071"},{"author":"Snyder","key":"ref34","article-title":"Verilator-convert Verilog code to C++\/SystemC"},{"author":"Mukherjee","key":"ref35","article-title":"v2c-a Verilog to C translator tool"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89363-1_16"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2019.8782476"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2018.8357256"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ITC50671.2022.00059"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744927"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3626202.3637563"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3284850.3284853"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413207"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24083"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092706"},{"key":"ref49","first-page":"19","article-title":"Symbolic execution of discrete event systems with uncertain time","volume":"S-12","author":"Dustmann","year":"2013","journal-title":"Lecture Notes in Informatics"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.28"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378278"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2021.3127288"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2025,8,4]]},"location":"Tokyo, Japan","end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133817.pdf?arnumber=11133817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:17:33Z","timestamp":1756531053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133817","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}