{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:15:46Z","timestamp":1775913346492,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,2]]},"DOI":"10.1109\/iwqos65803.2025.11143461","type":"proceedings-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:29:52Z","timestamp":1757438992000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Unleashing the Power of LLM to Infer State Machine From the Protocol Implementation"],"prefix":"10.1109","author":[{"given":"Haiyang","family":"Wei","sequence":"first","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]},{"given":"Ligeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Honor Device Co., Ltd"}]},{"given":"Zhengjie","family":"Du","sequence":"additional","affiliation":[{"name":"Geely Automobile Research Institute"}]},{"given":"Yuhan","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]},{"given":"Haohui","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]},{"given":"Yue","family":"Liu","sequence":"additional","affiliation":[{"name":"QI-ANXIN Group"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University"}]},{"given":"Fengyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]},{"given":"Linzhang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[{"name":"Nanjing University,The State Key Laboratory for Novel Software Technology"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref2","first-page":"2523","article-title":"Analysis of {DTLS} implementations using protocol state fuzzing","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Fiterau-Brostean","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"ref4","first-page":"3255","article-title":"Stateful greybox fuzzing","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Ba","year":"2022"},{"key":"ref5","article-title":"Hermes: Unlocking security analysis of cellular network protocols by synthesizing finite state machines from natural language specifications","volume-title":"33st USENIX Security Symposium (USENIX Security 24)","author":"Ishtiaq","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833673"},{"key":"ref7","first-page":"7019","article-title":"Extracting protocol format as state machine via controlled static loop analysis","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shi","year":"2023"},{"key":"ref8","article-title":"{NEMESYS}: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages","author":"Kleber","year":"2018","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24531"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155275"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409679"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639121"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623343"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24556"},{"key":"ref15","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"Wei","year":"2022"},{"key":"ref16","article-title":"Augmented large language models with parametric knowledge guiding","author":"Luo","year":"2023","journal-title":"arXiv preprint"},{"key":"ref17","first-page":"527542","article-title":"{WHYPER}: Towards automating risk assessment of mobile applications","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Pandita","year":"2013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.78"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639219"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00129"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623175"},{"key":"ref22","year":"2024","journal-title":"Internet key exchange protocol version 2 (ikev2)."},{"key":"ref23","year":"2024","journal-title":"strongswan is an opensource ipsec-based vpn solution."},{"key":"ref24","year":"2024","journal-title":"A library providing the core ikev2 funcionability."},{"key":"ref25","year":"2024","journal-title":"An internet key exchange (ike) implementation for linux, freebsd, netbsd and openbsd."},{"key":"ref26","year":"2024","journal-title":"An ipsec implementation for linux."},{"key":"ref27","article-title":"How long can context length of open-source llms truly promise?","author":"Li","year":"2023","journal-title":"NeurIPS 2023 Workshop on Instruction Tuning and Instruction Following"},{"key":"ref28","year":"2024","journal-title":"s2n-tls is a c99 implementation of the tls\/ssl protocols."},{"key":"ref29","year":"2024","journal-title":"Openbgpd is a free implementation of the border gateway protocol."},{"key":"ref30","year":"2024","journal-title":"Feng - standard compliant streaming server."},{"key":"ref31","year":"2024","journal-title":"Openl2tp is a complete implementation of rfc2661."},{"key":"ref32","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Lewis","year":"2020"},{"key":"ref33","year":"2024","journal-title":"Openai is an ai research and deployment company."},{"key":"ref34","author":"Douze","year":"2024","journal-title":"The faiss library"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590346"},{"key":"ref36","year":"2024","journal-title":"Gpt-4 is openai\u2019s most advanced system, producing safer and more useful responses."}],"event":{"name":"2025 IEEE\/ACM International Symposium on Quality of Service (IWQoS)","location":"Gold Coast, Australia","start":{"date-parts":[[2025,7,2]]},"end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE\/ACM 33rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11143240\/11143247\/11143461.pdf?arnumber=11143461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:05:01Z","timestamp":1757480701000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iwqos65803.2025.11143461","relation":{},"subject":[],"published":{"date-parts":[[2025,7,2]]}}}