{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:32Z","timestamp":1750306532844,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2667190.2667194","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"31-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["eFuzz"],"prefix":"10.1145","author":[{"given":"Henrique","family":"Dantas","sequence":"first","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[{"name":"TU Delft, Delft, Netherlands"}]},{"given":"Raymond","family":"Hallie","sequence":"additional","affiliation":[{"name":"European Network for Cyber Security, The Hague, Netherlands"}]},{"given":"Gerrit van der","family":"Bij","sequence":"additional","affiliation":[{"name":"Riscure BV, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Immunity Inc.","author":"Aitel D.","year":"2002","unstructured":"D. Aitel . The advantages of block-based protocol analysis for security testing . Immunity Inc. , February , 2002 . D. Aitel. The advantages of block-based protocol analysis for security testing. Immunity Inc., February, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.48"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.182"},{"key":"e_1_3_2_1_5_1","unstructured":"Deja vu Security. Fuzzing Embedded Devices with Peach Fuzzer. https:\/\/www.youtube.com\/watch?v=yevXIDaI_SA. Accessed: 2014-06.  Deja vu Security. Fuzzing Embedded Devices with Peach Fuzzer. https:\/\/www.youtube.com\/watch?v=yevXIDaI_SA. Accessed: 2014-06."},{"volume-title":"Peach fuzzing platform","key":"e_1_3_2_1_6_1","unstructured":"Deja vu Security. Peach fuzzing platform . http:\/\/old.peachfuzzer.com\/v2\/peach23.html. Accessed: 2014-02. Deja vu Security. Peach fuzzing platform. http:\/\/old.peachfuzzer.com\/v2\/peach23.html. Accessed: 2014-02."},{"key":"e_1_3_2_1_7_1","unstructured":"Deja vu Security. What is Peach? http:\/\/old.peachfuzzer.com\/WhatIsPeach.html. Accessed: 2014-03.  Deja vu Security. What is Peach? http:\/\/old.peachfuzzer.com\/WhatIsPeach.html. Accessed: 2014-03."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00021"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"28","article-title":"A survey on smart grid potential applications and communication requirements. Industrial Informatics","volume":"9","author":"Gungor V. C.","year":"2013","unstructured":"V. C. Gungor , D. Sahin , T. Kocak , S. Ergut , C. Buccella , C. Cecati , and G. P. Hancke . A survey on smart grid potential applications and communication requirements. Industrial Informatics , IEEE Transactions on , 9 ( 1 ): 28 -- 42 , 2013 . V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G. P. Hancke. A survey on smart grid potential applications and communication requirements. Industrial Informatics, IEEE Transactions on, 9(1):28--42, 2013.","journal-title":"IEEE Transactions on"},{"volume-title":"pySerial's documentation","author":"Liechti C.","key":"e_1_3_2_1_10_1","unstructured":"C. Liechti . pySerial's documentation . http:\/\/pyserial.sourceforge.net. Accessed: 2014-06. C. Liechti. pySerial's documentation. http:\/\/pyserial.sourceforge.net. Accessed: 2014-06."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"e_1_3_2_1_12_1","unstructured":"S. J. McIntyre. Termineter. https:\/\/github.com\/securestate\/termineter. Accessed: 2014-06.  S. J. McIntyre. Termineter. https:\/\/github.com\/securestate\/termineter. Accessed: 2014-06."},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"99","article-title":"Security technology for smart grid networks. Smart Grid","volume":"1","author":"Metke A. R.","year":"2010","unstructured":"A. R. Metke and R. L. Ekl . Security technology for smart grid networks. Smart Grid , IEEE Transactions on , 1 ( 1 ): 99 -- 107 , 2010 . A. R. Metke and R. L. Ekl. Security technology for smart grid networks. Smart Grid, IEEE Transactions on, 1(1):99--107, 2010.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_14_1","unstructured":"MicroSolved Inc. Protopredator. http:\/\/microsolved.com\/protoPredator.html. Accessed: 2014-06.  MicroSolved Inc. Protopredator. http:\/\/microsolved.com\/protoPredator.html. Accessed: 2014-06."},{"key":"e_1_3_2_1_15_1","first-page":"1988","author":"Miller B.","year":"1988","unstructured":"B. Miller . CS 736 Fall 1988 Project List, 1988 . B. Miller. CS 736 Fall 1988 Project List, 1988.","journal-title":"CS"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_17_1","unstructured":"MWR InfoSecurity. Usb fuzzing for the masses. https:\/\/labs.mwrinfosecurity.com\/blog\/2011\/07\/14\/usb-fuzzing-for-the-masses\/. Accessed: 2014-02.  MWR InfoSecurity. Usb fuzzing for the masses. https:\/\/labs.mwrinfosecurity.com\/blog\/2011\/07\/14\/usb-fuzzing-for-the-masses\/. Accessed: 2014-02."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38030-3_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"W. Simpson. PPP in HDLC-like framing. July 1994. RFC 1662.   W. Simpson. PPP in HDLC-like framing. July 1994. RFC 1662.","DOI":"10.17487\/rfc1662"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2nd Workshop on Smart Energy Grid Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2667190.2667194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2667190.2667194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:15Z","timestamp":1750227135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2667190.2667194"}},"subtitle":["A Fuzzer for DLMS\/COSEM Electricity Meters"],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":21,"alternative-id":["10.1145\/2667190.2667194","10.1145\/2667190"],"URL":"https:\/\/doi.org\/10.1145\/2667190.2667194","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}