{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:40:37Z","timestamp":1755801637097,"version":"3.44.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iske47853.2019.9170295","type":"proceedings-article","created":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T17:10:34Z","timestamp":1597770634000},"page":"850-856","source":"Crossref","is-referenced-by-count":0,"title":["Network Protocol Automatic Vulnerability Mining Technology Based on Fuzzing"],"prefix":"10.1109","author":[{"given":"Jintao","family":"Zhang","sequence":"first","affiliation":[{"name":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China"}]},{"given":"Duyu","family":"Liu","sequence":"additional","affiliation":[{"name":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China"}]},{"given":"Wei","family":"Xiang","sequence":"additional","affiliation":[{"name":"SouthwestMinzuUniversity State Ethnic Affairs Commission,Key Laboratory of Electronic and Information Engineering,ChengDu,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"84","article-title":"Research on network protocol vulnerability discovery based on fuzz testing [J]","volume":"39","author":"kaibian","year":"2016","journal-title":"Modern Electronics Technique"},{"key":"ref11","first-page":"4859","article-title":"A Tool for Monitoring Internet Multimedia Traffic[C]","volume":"30","author":"merwe","year":"2000","journal-title":"ACM Computer Communication Review"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.49"},{"key":"ref14","article-title":"Protocolindependent adaptive replay of application dialog","author":"wei-dong","year":"2006","journal-title":"Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1218063.1217938","article-title":"Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation","volume":"40","author":"georgios","year":"2006","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref16","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"james","year":"2005","journal-title":"Proc NDSS"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"242","DOI":"10.3724\/SP.J.1016.2011.00242","article-title":"An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method [J]","volume":"34","author":"weiming","year":"2011","journal-title":"Chinese Journal of Computers"},{"key":"ref3","first-page":"23","article-title":"Design and Implementation of Network Protocol Auto Vulnerability Ming Tool based on Fuzzing [J]","volume":"2014","author":"zhe","year":"0","journal-title":"Netinfo Security"},{"key":"ref6","article-title":"Vulnerability Mining for Network Protocols Based on Fuzzing [D]","author":"saidan","year":"2015","journal-title":"Beijing University of Posts and Telecommunications"},{"key":"ref5","article-title":"Research on Security Vulnerability Discovering Based on Fuzzing and Related Attack&Defense Techniques [D]","author":"zhiqiang","year":"2015","journal-title":"Xidian University"},{"key":"ref8","article-title":"Taint Scope: A checksumaware directed fuzzing fool for automatic software vulnerability detection[C]","author":"wang","year":"2010","journal-title":"In Proc IEEE Security and Privacy"},{"journal-title":"Static analysis tools as early indicators of prerelease defect density [M]","year":"2005","author":"nagappan","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s42400-018-0002-y","article-title":"Fuzzing: a survey [J]","volume":"1","author":"jun","year":"2018","journal-title":"Cybersecurity"},{"key":"ref1","article-title":"Fuzzing: Brute Force Vulnerability Discovery [M]","author":"sutton","year":"2007","journal-title":"Addison-Wesley Professional"},{"key":"ref9","first-page":"50","article-title":"Security analysis of industrial control network protocols based on Peach[J]","volume":"57","author":"shengwei","year":"2017","journal-title":"Journal of Tsinghua University(Science and Technology)"}],"event":{"name":"2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2019,11,14]]},"location":"Dalian, China","end":{"date-parts":[[2019,11,16]]}},"container-title":["2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9163188\/9170202\/09170295.pdf?arnumber=9170295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:40:52Z","timestamp":1755715252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9170295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iske47853.2019.9170295","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}