{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:23:09Z","timestamp":1773008589370,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647801","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework"],"prefix":"10.1109","author":[{"given":"Rene","family":"Helmke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eugen","family":"Winter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Rademacher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44874-8"},{"key":"ref31","author":"biondi","year":"0","journal-title":"Scapy &#x2013; Packet crafting for Python2 and Python3"},{"key":"ref30","article-title":"Revolutionizing the field of greybox attack surface testing with evolutionary fuzzing","volume":"15","author":"demott","year":"2007","journal-title":"DefCon"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469077"},{"key":"ref36","year":"0","journal-title":"IEC 60870-5-101\/104 C Source Code Library"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409729"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2991\/fmsmt-17.2017.119"},{"key":"ref11","article-title":"Fuzzing of SCADA Protocols used in Smart Grids","author":"winter","year":"2020","journal-title":"Abstr from the 9th DACH+ Conf on Energy Inform"},{"key":"ref12","author":"pereyda","year":"0","journal-title":"Boofuzz Fuzzer"},{"key":"ref13","year":"0","journal-title":"Peach Fuzzer LLC Peach Fuzzer"},{"key":"ref14","author":"sutton","year":"2007","journal-title":"Fuzzing Brute Force Vulnerability Discovery"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"ref16","article-title":"AFL++: Combining Incremental Steps of Fuzzing Research","author":"fioraldi","year":"2020","journal-title":"Proc of the 14th USENIX Workshop on Offensive Technologies"},{"key":"ref17","article-title":"MOPT: Optimized Mutation Scheduling for Fuzzers","author":"lyu","year":"2019","journal-title":"Proc of the 28th USENIX Secur Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"ref19","article-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing","author":"wang","year":"2019","journal-title":"Proc of the 2019 Int Symp on Research in Attacks Intrusions and Defenses"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2487274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_18"},{"key":"ref3","article-title":"The Art, Science, and Engineering of Fuzzing: A Survey","author":"man\u00e8s","year":"2019","journal-title":"IEEE Trans on Softw Eng"},{"key":"ref6","author":"zalewski","year":"0","journal-title":"American Fuzzy Lop"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"ref8","author":"swiecki","year":"0","journal-title":"Honggfuzz"},{"key":"ref7","year":"0","journal-title":"libFuzzer &#x2013; a library for coverage-guided fuzz testing"},{"key":"ref2","year":"0","journal-title":"OSS-Fuzz &#x2013; Continuous Fuzzing for Open Source Software"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00026"},{"key":"ref9","article-title":"IEC 61850 Industrial Communication Standards Under Test","author":"tilaro","year":"2013","journal-title":"Proc of the 2013 Int Conf on Accelerator & Large Experimental Physics Control Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref22","year":"0","journal-title":"Sulley Fuzzer"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24864-1_5"},{"key":"ref23","year":"0","journal-title":"fuzzowski"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref25","year":"0","journal-title":"Mutiny Fuzzing Framework"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2021,12,13]]},"end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647801.pdf?arnumber=9647801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647801","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}