{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:10:06Z","timestamp":1751094606814,"version":"3.41.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1109\/ict65093.2025.11046228","type":"proceedings-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:40:25Z","timestamp":1750959625000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["RRCFuzzer: A 3GPP-Guided Fuzzing Method for Radio Resource Control Protocol"],"prefix":"10.1109","author":[{"given":"Binghong","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, School of Cyber Security, University of Chinese Academy of Sciences,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Ning","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, School of Cyber Security, University of Chinese Academy of Sciences,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Xiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yanyan","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yuejin","family":"Du","sequence":"additional","affiliation":[{"name":"Guizhou Big Data Protection Engineering, Research Center,Beijing,China"}]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"volume-title":"The Mobile Economy 2024","year":"2024","key":"ref1"},{"volume-title":"About 3GPP","year":"1998","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob52687.2021.9606317"},{"volume-title":"American Fuzz Loop","year":"2014","author":"Zalewski","key":"ref4"},{"volume-title":"libFuzzer - a library for coverage-guided fuzz testing","year":"2014","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"volume-title":"Common vulnerabilities and exposures (cve)","key":"ref7"},{"volume-title":"BooFuzz","year":"2016","author":"Pereira","key":"ref8"},{"volume-title":"Peach","year":"2007","author":"Sutton","key":"ref9"},{"volume-title":"Sulley","year":"2009","author":"Marlinspike","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref12","first-page":"489","article-title":"Tcp-fuzz: Detecting memory and semantic bugs in TCP stacks with fuzzing","volume-title":"Proceedings of the 2021 USENIX Annual Technical Conference, USENIX ATC 2021","author":"Zou","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3453688.3461497"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180226"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485388"},{"key":"ref17","first-page":"1325","article-title":"Doltest: In-depth downlink negative testing framework for LTE devices","volume-title":"31st USENIX Security Symposium, USENIX Security 2022","author":"Park","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590194"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690312"},{"key":"ref21","article-title":"Covfuzz: Coverage-based fuzzer for 4g&5g protocols","volume":"abs\/2410.20958","author":"Siros","year":"2024","journal-title":"CoRR"},{"volume-title":"srsran: Open-source 4g\/5g software radio suite","key":"ref22"}],"event":{"name":"2025 31st International Conference on Telecommunications (ICT)","start":{"date-parts":[[2025,4,28]]},"location":"Budva, Montenegro","end":{"date-parts":[[2025,4,29]]}},"container-title":["2025 31st International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11046192\/11045962\/11046228.pdf?arnumber=11046228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:36:20Z","timestamp":1751092580000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11046228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ict65093.2025.11046228","relation":{},"subject":[],"published":{"date-parts":[[2025,4,28]]}}}