{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:14Z","timestamp":1750306034055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,8]]},"DOI":"10.1145\/3171592.3171622","type":"proceedings-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:53:36Z","timestamp":1521204816000},"page":"38-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying Binary Patch Comparison to Cisco IOS"],"prefix":"10.1145","author":[{"given":"Haobin","family":"Sun","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Da","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Ruiqing","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"issue":"60","key":"e_1_3_2_1_1_1","volume":"11","author":"X' Lindner Felix","year":"2002","unstructured":"Felix 'F X' Lindner . Burning the bridge: Cisco IOS exploits {J\/OL}. Phrack Magazine , 2002 , 11 ( 60 ). Felix 'FX' Lindner. Burning the bridge: Cisco IOS exploits {J\/OL}. Phrack Magazine, 2002, 11(60).","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_2_1","volume-title":"Black Hat USA","author":"Lynn Michael","year":"2005","unstructured":"Michael Lynn . The Holy Grail: Cisco IOS shellcode and exploitation techniques . In Black Hat USA , Las Vegas , NV. July 2005 . Michael Lynn. The Holy Grail: Cisco IOS shellcode and exploitation techniques. In Black Hat USA, Las Vegas, NV. July 2005."},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"23","volume":"12","author":"Cui Ang","year":"2011","unstructured":"Ang Cui , Jatin Kataria , Salvatore J. Stolfo . Killing the Myth of Cisco IOS Diversity{J}. USENIX Workshop on Offensive Technologies , California, USA , 2011 , 12 ( 3 ): 23 -- 31 . Ang Cui, Jatin Kataria, Salvatore J. Stolfo. Killing the Myth of Cisco IOS Diversity{J}. USENIX Workshop on Offensive Technologies, California, USA, 2011, 12(3): 23--31.","journal-title":"California, USA"},{"key":"e_1_3_2_1_4_1","unstructured":"Synergy Research Group. Cisco Continues to Roll with the Punches in Switching & Router Market {EB\/OL}. {2016-08-30}. https:\/\/www.srgresearch.com\/articles\/cisco-continues-roll-punches-switching-router-market.  Synergy Research Group. Cisco Continues to Roll with the Punches in Switching & Router Market {EB\/OL}. {2016-08-30}. https:\/\/www.srgresearch.com\/articles\/cisco-continues-roll-punches-switching-router-market."},{"volume-title":"Dependable Systems & Networks, 2009. DSN'09. IEEE\/IFIP International Conference on. IEEE","author":"Xie","key":"e_1_3_2_1_5_1","unstructured":"Xie T, Tillmann N, de Halleux J, Fitness-guided path exploration in dynamic symbolic execution{C} . Dependable Systems & Networks, 2009. DSN'09. IEEE\/IFIP International Conference on. IEEE , 2009: 359--368. Xie T, Tillmann N, de Halleux J, et al. Fitness-guided path exploration in dynamic symbolic execution{C}. Dependable Systems & Networks, 2009. DSN'09. IEEE\/IFIP International Conference on. IEEE, 2009: 359--368."},{"key":"e_1_3_2_1_6_1","unstructured":"SPIKE fuzzing platform. http:\/\/www.immunitysec.com\/resources-freesoftware.shtml.  SPIKE fuzzing platform. http:\/\/www.immunitysec.com\/resources-freesoftware.shtml."},{"key":"e_1_3_2_1_7_1","unstructured":"beSTORM. http:\/\/www.beyondsecurity.com\/bestorm_whitepaper.html.  beSTORM. http:\/\/www.beyondsecurity.com\/bestorm_whitepaper.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco. Crafted IP Option Vulnerability {EB\/OL}. {2007-01-24}. https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecu-rityAdvisory\/cisco-sa-20070124-crafted-ip-option.  Cisco. Crafted IP Option Vulnerability {EB\/OL}. {2007-01-24}. https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecu-rityAdvisory\/cisco-sa-20070124-crafted-ip-option."},{"key":"e_1_3_2_1_9_1","volume-title":"ShmooCon","author":"Rey Enno","year":"2008","unstructured":"Enno Rey and Daniel Mende . Advanced Protocol Fuzzing -- What We Learned when Bringing Layer2 Logic to SPIKE Land . In ShmooCon 2008 . Washington , USA. 2008. Enno Rey and Daniel Mende. Advanced Protocol Fuzzing -- What We Learned when Bringing Layer2 Logic to SPIKE Land. In ShmooCon 2008. Washington, USA. 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"Postel J. Internet Protocol IETF RFC 791 September 1981. http:\/\/www.ietf.org\/rfc\/rfc791.txt.  Postel J. Internet Protocol IETF RFC 791 September 1981. http:\/\/www.ietf.org\/rfc\/rfc791.txt."},{"key":"e_1_3_2_1_11_1","unstructured":"Dynamips Project {DB\/OL}. {2011-05-21}. https:\/\/github.com\/GNS3\/dynamips.  Dynamips Project {DB\/OL}. {2011-05-21}. https:\/\/github.com\/GNS3\/dynamips."},{"key":"e_1_3_2_1_12_1","volume-title":"Blackhat Europe. Barcelona, Spain.","author":"Mu\u00f1iz Sebastian","year":"2011","unstructured":"Sebastian Mu\u00f1iz and Alfredo Ortega . Fuzzing and Debugging Cisco IOS . In Blackhat Europe. Barcelona, Spain. 2011 . Sebastian Mu\u00f1iz and Alfredo Ortega. Fuzzing and Debugging Cisco IOS. In Blackhat Europe. Barcelona, Spain. 2011."},{"key":"e_1_3_2_1_13_1","unstructured":"Grid32 Security. Writing Cisco IOS Rootkits {EB\/OL}. http:\/\/www.infosecwriters.com\/Papers\/Luca_cisco_ios_rootkits.pdf 2015.  Grid32 Security. Writing Cisco IOS Rootkits {EB\/OL}. http:\/\/www.infosecwriters.com\/Papers\/Luca_cisco_ios_rootkits.pdf 2015."},{"key":"e_1_3_2_1_14_1","unstructured":"Patchdiff. https:\/\/code.google.com\/archive\/p\/patchdiff2.  Patchdiff. https:\/\/code.google.com\/archive\/p\/patchdiff2."},{"key":"e_1_3_2_1_15_1","volume-title":"Amini P. Fuzzing: Brute Force Vulnerability Discovery {M}","author":"Sutton","year":"2007","unstructured":"Sutton M, Greene A , Amini P. Fuzzing: Brute Force Vulnerability Discovery {M} . Addison-Wesley Professional , 2007 . Sutton M, Greene A, Amini P. Fuzzing: Brute Force Vulnerability Discovery {M}. Addison-Wesley Professional, 2007."}],"event":{"name":"ICNCC 2017: 2017 VI International Conference on Network, Communication and Computing","acronym":"ICNCC 2017","location":"Kunming China"},"container-title":["Proceedings of the 2017 VI International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171592.3171622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:53Z","timestamp":1750215773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":15,"alternative-id":["10.1145\/3171592.3171622","10.1145\/3171592"],"URL":"https:\/\/doi.org\/10.1145\/3171592.3171622","relation":{},"subject":[],"published":{"date-parts":[[2017,12,8]]},"assertion":[{"value":"2017-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}