{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:20:20Z","timestamp":1740100820390,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833866","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"124-135","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Parser Generation Framework for IoT Protocols on Microcontrollers"],"prefix":"10.1109","author":[{"given":"Sameed","family":"Ali","sequence":"first","affiliation":[{"name":"Dartmouth College,Hanover"}]},{"given":"Sean","family":"Smith","sequence":"additional","affiliation":[{"name":"Dartmouth College,Hanover"}]}],"member":"263","reference":[{"key":"ref10","first-page":"233","article-title":"Frama-c: A software analysis perspective","author":"cuoq","year":"2012","journal-title":"Proceedings of the 10th International Conference on Software Engineering and Formal Methods SEFM&#x2019;12"},{"journal-title":"A Guide to the SQL Standard","year":"1989","author":"date","key":"ref11"},{"journal-title":"Bluetooth Low Energy A Technical Primer Your Guide to the Magic Behind the Internet of Things","year":"2017","author":"gaitatzis","key":"ref12"},{"key":"ref13","first-page":"16","author":"garbelini","year":"0","journal-title":"Sumei Sun and Ernest Kurniawan Sweyn-Tooth Unleashing Mayhem over Bluetooth Low Energy"},{"journal-title":"Software Firmware and Hardware Designs for Ubertooth","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1408681.1408682"},{"journal-title":"Monadic Parser Combinators","year":"1996","author":"hutton","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_19"},{"key":"ref18","article-title":"A verified ll (1) parser generator","author":"lasser","year":"2019","journal-title":"10th International Conference on Interactive Theorem Proving (ITP 2019)"},{"key":"ref19","first-page":"420","author":"lasser","year":"2021","journal-title":"CoStar A Verified ALL(*) Parser"},{"journal-title":"Ubertooth one","year":"0","key":"ref4"},{"journal-title":"nRF52840 Nordic Semiconductor","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_12"},{"key":"ref5","first-page":"615","article-title":"Nail: A practical tool for parsing and generating data formats","author":"bangert","year":"2014","journal-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372885.3373836"},{"journal-title":"Interactive Theorem Proving and Program Development Coq'Art The Calculus of Inductive Constructions","year":"2013","author":"bertot","key":"ref7"},{"journal-title":"Kaitai Struct declarative binary format parsing language","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"journal-title":"Apache Daffodil | Home","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.33"},{"journal-title":"Hammer Parser Combinators in C","year":"0","author":"patterson","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-55602-8_217"},{"key":"ref24","first-page":"1465","article-title":"{EverParse}: Verified secure {Zero-Copy} parsers for authenticated message formats","author":"ramananandro","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref23","first-page":"19","article-title":"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats","author":"ramananandro","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837655"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71067-7_6"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833866.pdf?arnumber=9833866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:40Z","timestamp":1660593760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833866","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}