{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:40:46Z","timestamp":1767724846237,"version":"3.48.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018537","name":"Smart Grid-National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2025ZD0808500"],"award-info":[{"award-number":["2025ZD0808500"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFB2701600"],"award-info":[{"award-number":["2022YFB2701600"]}]},{"name":"Beijing Natural Science Foundation","award":["4252019"],"award-info":[{"award-number":["4252019"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20467"],"award-info":[{"award-number":["U21A20467"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24B20144"],"award-info":[{"award-number":["U24B20144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62572038"],"award-info":[{"award-number":["62572038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272464"],"award-info":[{"award-number":["62272464"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Beijing-Tianjin-Hebei","award":["25JJJJC0033"],"award-info":[{"award-number":["25JJJJC0033"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Funds of Renmin University of China","award":["202530187"],"award-info":[{"award-number":["202530187"]}]},{"DOI":"10.13039\/501100015595","name":"Ethereum Foundation Academic Grant","doi-asserted-by":"publisher","award":["2024 ID.FY24-1534"],"award-info":[{"award-number":["2024 ID.FY24-1534"]}],"id":[{"id":"10.13039\/501100015595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2025.3648565","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:23:11Z","timestamp":1766773391000},"page":"578-591","source":"Crossref","is-referenced-by-count":0,"title":["Network-Layer Differential Fuzzing for Ethereum"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7929-7212","authenticated-orcid":false,"given":"Fudong","family":"Wu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6407-4194","authenticated-orcid":false,"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9500-6100","authenticated-orcid":false,"given":"Jia-Ju","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9548-8306","authenticated-orcid":false,"given":"Bo","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Information, Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3959-338X","authenticated-orcid":false,"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"263","reference":[{"volume-title":"DevP2P: A Set of Network-Layer Protocols of the Ethereum","year":"2025","key":"ref1"},{"volume-title":"CVE-2024-32972: DoS Attacks via P2P Message in Geth","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2556"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3341175"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3267277"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3728946"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616251"},{"key":"ref8","first-page":"349","article-title":"Finding consensus bugs in Ethereum via multi-transaction differential fuzzing","volume-title":"Proc. 15th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Yang"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179386"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623071"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3428278"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621414"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678888"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404366"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00229"},{"key":"ref18","first-page":"1029","article-title":"Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts","volume-title":"Proc. 35th Int. Conf. Automated Softw. Eng. (ASE)","author":"Xue"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111653"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534222"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00087"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref23","first-page":"489","article-title":"TCP-fuzz: Detecting memory and semantic bugs in TCP stacks with fuzzing","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Zou"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680394"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3192991"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"ref27","first-page":"4481","article-title":"BLEEM: Packet sequence oriented fuzzing for protocol implementations","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Luo"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6880677"},{"volume-title":"Boofuzz: Network Protocol Fuzzing for Humans","year":"2025","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"volume-title":"Geth: Go Implementation of the Ethereum Protocol","year":"2025","key":"ref31"},{"volume-title":"Erigon: Ethereum Implementation on the Efficiency Frontier","year":"2025","key":"ref32"},{"volume-title":"Ethereum Execution Specifications","year":"2025","key":"ref33"},{"volume-title":"Ethereum Hive","year":"2025","key":"ref34"},{"volume-title":"ASan: Address Sanitizer","key":"ref35"},{"volume-title":"MSan: Memory Sanitizer","year":"2025","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908095"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00061"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639208"},{"volume-title":"Porcupine: A Fast Linearizability Checker","year":"2025","key":"ref40"},{"volume-title":"Knossos: Verifies the Linearizability of Experimentally Accessible Histories","year":"2025","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"volume-title":"AFL-Tmin: Test Case Minimizer for AFL","year":"2025","key":"ref43"},{"volume-title":"Nethermind","year":"2025","key":"ref44"},{"volume-title":"Hyperledger Besu","year":"2025","key":"ref45"},{"volume-title":"Reth","year":"2025","key":"ref46"},{"volume-title":"Ethereum Mainnet Statistics","year":"2025","key":"ref47"},{"volume-title":"LOKI Code Repository","year":"2025","key":"ref48"},{"volume-title":"EthereumJS: Ethereum JS Community","year":"2025","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3580597"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623315"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3288876"},{"key":"ref53","first-page":"2595","article-title":"Fuzzing error handling code using context-sensitive software fault injection","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Jiang"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11316202.pdf?arnumber=11316202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:34:42Z","timestamp":1767724482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3648565","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2026]]}}}