{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:08:44Z","timestamp":1770433724635,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,7,19]],"date-time":"2007-07-19T00:00:00Z","timestamp":1184803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,7,19]]},"DOI":"10.1145\/1326304.1326313","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"47-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["KiF"],"prefix":"10.1145","author":[{"given":"Humberto J.","family":"Abdelnur","sequence":"first","affiliation":[{"name":"LORIA - INRIA Lorraine, Villers-les-Nancy, France"}]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[{"name":"LORIA - INRIA Lorraine, Villers-les-Nancy, France"}]},{"given":"Olivier","family":"Festor","sequence":"additional","affiliation":[{"name":"LORIA - INRIA Lorraine, Villers-les-Nancy, France"}]}],"member":"320","published-online":{"date-parts":[[2007,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374802"},{"key":"e_1_3_2_1_2_1","unstructured":"D. Aitel. \"The Advantages of Block-Based Protocol Analysis for Security Testing\". Immunity Inc February 2002.  D. Aitel. \"The Advantages of Block-Based Protocol Analysis for Security Testing\". Immunity Inc February 2002."},{"key":"e_1_3_2_1_3_1","volume-title":"Fuzzing with SPIKE 2006\". Immunity Inc","author":"Aitel D.","year":"2006","unstructured":"D. Aitel . \"MSRPC Fuzzing with SPIKE 2006\". Immunity Inc , August 2006 . D. Aitel. \"MSRPC Fuzzing with SPIKE 2006\". Immunity Inc, August 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_25"},{"key":"e_1_3_2_1_5_1","volume-title":"Software Testing Techniques","author":"Beizer B.","year":"1990","unstructured":"B. Beizer . Software Testing Techniques . John Wiley & Sons, Inc. , New York, NY, USA , 1990 . B. Beizer. Software Testing Techniques. John Wiley & Sons, Inc., New York, NY, USA, 1990."},{"key":"e_1_3_2_1_6_1","volume-title":"Standards Track","author":"Crocker D.","year":"1997","unstructured":"D. Crocker . \" Augmented BNF for Syntax Specifications : ABNF \". Standards Track , November 1997 . D. Crocker. \"Augmented BNF for Syntax Specifications: ABNF\". Standards Track, November 1997."},{"key":"e_1_3_2_1_7_1","volume-title":"Black Hat","author":"Embleton S.","year":"2006","unstructured":"S. Embleton , S. Sparks , and R. Cunningham . \" Sidewinder: An Evolutionary Guidance System for Malicious Input Crafting \". Black Hat , August 2006 . S. Embleton, S. Sparks, and R. Cunningham. \"Sidewinder: An Evolutionary Guidance System for Malicious Input Crafting\". Black Hat, August 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964011"},{"key":"e_1_3_2_1_9_1","first-page":"5873","volume":"951","author":"Kaksonen R.","year":"2001","unstructured":"R. Kaksonen . \" A Functional Method for Assessing Protocol Implementation Security\", Licentiate Thesis . VTT Publications 447. ISBN 951-38 - 5873 - 5871 , 2001 . R. Kaksonen. \"A Functional Method for Assessing Protocol Implementation Security\", Licentiate Thesis. VTT Publications 447. ISBN 951-38-5873-1, 2001.","journal-title":"ISBN"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/645532.656332"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EASE.2006.3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.56422"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.73"},{"key":"e_1_3_2_1_14_1","unstructured":"O. University. PROTOS Test-Suite: c07-sip. http:\/\/www.ee.oulu.fi\/research\/ouspg\/protos\/testing\/c07\/sip 2005.  O. University. PROTOS Test-Suite: c07-sip. http:\/\/www.ee.oulu.fi\/research\/ouspg\/protos\/testing\/c07\/sip 2005."}],"event":{"name":"IPTComm07: IPTComm07 Principles, Systems and Applications of IP Telecommunications","location":"New York City New York","acronym":"IPTComm07","sponsor":["AT&T AT&T","SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","Tekelec","Dialogic","Mu Security"]},"container-title":["Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1326304.1326313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1326304.1326313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:24Z","timestamp":1750254984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1326304.1326313"}},"subtitle":["a stateful SIP fuzzer"],"short-title":[],"issued":{"date-parts":[[2007,7,19]]},"references-count":14,"alternative-id":["10.1145\/1326304.1326313","10.1145\/1326304"],"URL":"https:\/\/doi.org\/10.1145\/1326304.1326313","relation":{},"subject":[],"published":{"date-parts":[[2007,7,19]]},"assertion":[{"value":"2007-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}