{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:25:24Z","timestamp":1725510324607},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127448","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"1115-1120","source":"Crossref","is-referenced-by-count":1,"title":["Fuzzing test data generation based on message matrix perturbation with keyword reference"],"prefix":"10.1109","author":[{"given":"Shijia","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yueyang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Weihai","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wireshark","year":"0","key":"15"},{"journal-title":"Federal Standard 1037c","year":"1996","key":"13"},{"journal-title":"RFC 2616 Hypertext Transfer Protocol - HTTP\/1 1","year":"1999","author":"fielding","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"journal-title":"How Samba was Written","year":"0","author":"tridgell","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.91"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.55"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"1"},{"journal-title":"Bidirectional Protocol Reverse Engineering Message Format Extraction and Field Semantics Inference","year":"2009","author":"caballero","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1145\/1315245.1315286","article-title":"Polyglot: Automatic extraction of protocol message format using dynamic binary analysis","author":"caballero","year":"2007","journal-title":"CCS '07"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20251"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/505776.505792"},{"journal-title":"PROTOS - Security Testing of Protocol Implementations","year":"0","key":"4"},{"key":"9","article-title":"Automatic protocol format reverse engineering through conectect-aware monitored execution","author":"lin","year":"0","journal-title":"15th Symposium on Network and Distributed System Security NDSS 2008"},{"key":"8","article-title":"Discoverer: Automatic protocol reverse engineering from network traces","author":"cui","year":"2007","journal-title":"SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127448.pdf?arnumber=6127448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:03:36Z","timestamp":1497971016000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127448","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}