{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T04:04:20Z","timestamp":1751169860076,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1109\/ict65093.2025.11046294","type":"proceedings-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:40:25Z","timestamp":1750959625000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["A Coverage-Guided Fuzzing Method for Non-Access Stratum Protocol"],"prefix":"10.1109","author":[{"given":"Binghong","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Xingyu","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Xiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yanyan","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yuejin","family":"Du","sequence":"additional","affiliation":[{"name":"Guizhou Big Data Protection Engineering,Research Center,Beijing,China"}]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485388"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00104"},{"key":"ref3","first-page":"1325","article-title":"Doltest: In-depth downlink negative testing framework for LTE devices","volume-title":"31st USENIX Security Symposium, USENIX Security 2022","author":"Park","year":"2022"},{"key":"ref4","article-title":"Hermes: Unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14\u201316, 2024","author":"Ishtiaq","year":"2024"},{"key":"ref5","article-title":"Logic gone astray: A security analysis framework for the control plane protocols of 5 g basebands","volume-title":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14\u201316, 2024","author":"Tu","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690312"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670320"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656141"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2024.24527","article-title":"5 g -spector: An O-RAN compliant layer-3 cellular attack detection service","volume-title":"31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024. The Internet Society","author":"Wen","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icst46399.2020.00062"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2022.23008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3358227"},{"volume-title":"Peach","year":"2007","author":"Sutton","key":"ref13"},{"key":"ref14","first-page":"3255","article-title":"Stateful greybox fuzzing","volume-title":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 1012, 2022","author":"Ba","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10233-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3192991"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/dac18074.2021.9586321"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3580599"}],"event":{"name":"2025 31st International Conference on Telecommunications (ICT)","start":{"date-parts":[[2025,4,28]]},"location":"Budva, Montenegro","end":{"date-parts":[[2025,4,29]]}},"container-title":["2025 31st International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11046192\/11045962\/11046294.pdf?arnumber=11046294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:27:02Z","timestamp":1751092022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11046294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ict65093.2025.11046294","relation":{},"subject":[],"published":{"date-parts":[[2025,4,28]]}}}