{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T09:59:40Z","timestamp":1775815180338,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation","award":["NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001"]}]},{"name":"National Science Foundation of China","award":["61872262, 61572349"],"award-info":[{"award-number":["61872262, 61572349"]}]},{"name":"Singapore Ministry of Education Academic Research Fund Tier 1","award":["2018-T1-002-069"],"award-info":[{"award-number":["2018-T1-002-069"]}]},{"name":"Singapore National Research Foundation","award":["NCR NSOE003-0001, NRFI06-2020-0022"],"award-info":[{"award-number":["NCR NSOE003-0001, NRFI06-2020-0022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416552","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"524-535","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SADT"],"prefix":"10.1145","author":[{"given":"Lili","family":"Quan","sequence":"first","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Qianyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Hongxu","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaohong","family":"Li","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Jing","family":"Hu","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tim R\u00fchsen Daiki Ueno Dmitry Baryshkov. 2020. The GnuTLS Transport Layer Security Library. https:\/\/www.gnutls.org"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610403"},{"key":"e_1_3_2_1_3_1","unstructured":"ARM Limited. 2020. armMBED. https:\/\/tls.mbed.org"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Richard Barnes Martin Thomson Alfredo Pironti and Adam Langley. 2015. Deprecating Secure Sockets Layer Version 3.0. RFC 7568. 10.17487\/RFC7568","DOI":"10.17487\/RFC7568"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Mark Brown and Russ Housley. 2010. Transport Layer Security (TLS) Authorization Extensions. RFC 5878. 10.17487\/RFC5878","DOI":"10.17487\/RFC5878"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"e_1_3_2_1_7_1","volume-title":"DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL\/TLS Implementations. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Chen Chao","year":"2018","unstructured":"Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, and Chengyu Hu. 2018. DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL\/TLS Implementations. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 48--58."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180226"},{"key":"e_1_3_2_1_9_1","volume-title":"MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Chen Hongxu","year":"2020","unstructured":"Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, and Yang Liu. 2020. MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2325--2342. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-hongxu"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_11_1","volume-title":"2018 IEEE Symposium on Security and Privacy (SP). 711--725","author":"Chen P.","unstructured":"P. Chen and H. Chen. 2018. Angora: Efficient Fuzzing by Principled Search. In 2018 IEEE Symposium on Security and Privacy (SP). 711--725."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"e_1_3_2_1_13_1","volume-title":"RFC","author":"Chokhani Santosh","year":"1999","unstructured":"Santosh Chokhani, Warwick Ford, Randy Sabett, Charles Merrill, and Stephen Wu. 1999. RFC 2527: Internet X. 509 public key infrastructure certificate policy and certification practices framework. Internet Engineering Task Force (IETF), RFC (1999)."},{"key":"e_1_3_2_1_14_1","volume-title":"IETF","author":"Cooper David","year":"2008","unstructured":"David Cooper, Stefan Santesson, S Farrell, Sharon Boeyen, Rusell Housley, and W Polk. 2008. RFC 5280: Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF, May (2008)."},{"key":"e_1_3_2_1_15_1","volume-title":"The great dom fuzz-off of","year":"2017","unstructured":"Fratric. 2017. The great dom fuzz-off of 2017. https:\/\/googleprojectzero.blogspot.sg\/2017\/09\/the-great-dom-fuzz-off-of-2017.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6101"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_18_1","unstructured":"gnutls. 2019. Gnutls accepts a certificate whose notbefore field is a non-digits string while openssl rejects such certificates. https:\/\/gitlab.com\/gnutls\/gnutls\/-\/issues\/870"},{"key":"e_1_3_2_1_19_1","unstructured":"gnutls. 2019. gnutls accepts certificates including two instance of a particular extension. https:\/\/gitlab.com\/gnutls\/gnutls\/-\/issues\/887"},{"key":"e_1_3_2_1_20_1","unstructured":"gnutls. 2019. gnutls can't check certificate issuer correctly according to RFC5280. https:\/\/gitlab.com\/gnutls\/gnutls\/-\/issues\/885"},{"key":"e_1_3_2_1_21_1","unstructured":"gnutls. 2019. gnutls can't check object identifier value correctly. https:\/\/gitlab.com\/gnutls\/gnutls\/-\/issues\/886"},{"key":"e_1_3_2_1_22_1","unstructured":"gnutls. 2019. GnuTLS3.6.7.1 cannot process validity field according to RFC5280. https:\/\/gitlab.com\/gnutls\/gnutls\/-\/issues\/864"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_1_28_1","unstructured":"LLVM. 2020. libFuzzer-a library for coverage-guided fuzz testing - LLVM 3.9 documentation. http:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_1_29_1","volume-title":"More tricks for defeating SSL in practice. Black Hat USA","author":"Marlinspike Moxie","year":"2009","unstructured":"Moxie Marlinspike. 2009. More tricks for defeating SSL in practice. Black Hat USA (2009)."},{"key":"e_1_3_2_1_30_1","unstructured":"mbedtls. 2019. mbedtls2.16.3 accepts invalid certificate whose key identifier field of the authority key identifier extension is not the same as subject key identifier in issuer. https:\/\/github.com\/ARMmbed\/mbedtls\/issues\/2954"},{"key":"e_1_3_2_1_31_1","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman William M","year":"1998","unstructured":"William M McKeeman. 1998. Differential testing for software. Digital Technical Journal 10, 1 (1998), 100--107.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_32_1","unstructured":"Microsoft. 2020. Distinguished Encoding Rules. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/seccertenroll\/distinguished-encoding-rules"},{"key":"e_1_3_2_1_33_1","volume-title":"BlackHat Conference, USA.","author":"Moixe Marlingspike","year":"2009","unstructured":"Marlingspike Moixe. 2009. New tricks for defeating ssl in practice. In BlackHat Conference, USA."},{"key":"e_1_3_2_1_34_1","unstructured":"mozilla. 2019. NSS accepts a version-1 certificate with extension fields. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1603034"},{"key":"e_1_3_2_1_35_1","unstructured":"mozilla. 2019. NSS UTCTime parser should reject short fields. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1599331"},{"key":"e_1_3_2_1_36_1","unstructured":"Mozilla. 2020. Network Security Services. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/NSS"},{"key":"e_1_3_2_1_37_1","unstructured":"M. Zalewski. 2020. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_38_1","unstructured":"OpenBSD. 2020. LibreSSL. https:\/\/www.libressl.org\/"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenSSL. 2019. openssl accepts a certificate with version 1 and extension fields. https:\/\/github.com\/openssl\/openssl\/issues\/10599"},{"key":"e_1_3_2_1_40_1","unstructured":"OpenSSL. 2019. openssl accepts certificates including two instance of a particular extension. https:\/\/github.com\/openssl\/openssl\/issues\/10686"},{"key":"e_1_3_2_1_41_1","unstructured":"OpenSSL Software Foundation. 2020. OpenSSL. https:\/\/www.openssl.org"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.27"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_44_1","volume-title":"Transport Layer Security (TLS) session hash and extended master secret extension. Transport","author":"Ray Marsh","year":"2015","unstructured":"Marsh Ray, Alfredo Pironti, Adam Langley, Karthikeyan Bhargavan, and Antoine Delignat-Lavaud. 2015. Transport Layer Security (TLS) session hash and extended master secret extension. Transport (2015)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","unstructured":"Eric Rescorla. 2000. HTTP Over TLS. RFC 2818. 10.17487\/RFC2818","DOI":"10.17487\/RFC2818"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Eric Rescorla and Tim Dierks. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. 10.17487\/RFC5246","DOI":"10.17487\/RFC5246"},{"key":"e_1_3_2_1_47_1","first-page":"1","article-title":"Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X. 509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)","volume":"6125","author":"Saint-Andre Peter","year":"2011","unstructured":"Peter Saint-Andre and Jeff Hodges. 2011. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X. 509 (PKIX) Certificates in the Context of Transport Layer Security (TLS). RFC 6125 (2011), 1--57.","journal-title":"RFC"},{"key":"e_1_3_2_1_48_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In NDSS Symposium","author":"Sanjay Rawat Vivek Jain","year":"2017","unstructured":"Vivek Jain Sanjay Rawat, Lucian Cojocar Ashish Kumar, and Herbert Bos Cristiano Giuffrida. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS Symposium 2017."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.46"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_1_51_1","volume-title":"Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities. In 42nd International Conference on Software Engineering. ACM.","author":"Wang Haijun","year":"2020","unstructured":"Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, and Yulei Sui. 2020. Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities. In 42nd International Conference on Software Engineering. ACM."},{"key":"e_1_3_2_1_52_1","volume-title":"Skyfire: Data-Driven Seed Generation for Fuzzing. In 2017 IEEE Symposium on Security and Privacy (SP). 579--594","author":"Wang J.","unstructured":"J. Wang, B. Chen, L. Wei, and Y. Liu. 2017. Skyfire: Data-Driven Seed Generation for Fuzzing. In 2017 IEEE Symposium on Security and Privacy (SP). 579--594."},{"key":"e_1_3_2_1_53_1","volume-title":"Superion: Grammar-Aware Greybox Fuzzing. CoRR abs\/1812.01197","author":"Wang Junjie","year":"2018","unstructured":"Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2018. Superion: Grammar-Aware Greybox Fuzzing. CoRR abs\/1812.01197 (2018). arXiv:1812.01197 http:\/\/arxiv.org\/abs\/1812.01197"},{"key":"e_1_3_2_1_54_1","unstructured":"wolfssl. 2019. wolfssl 4.0.0 accepts a certificate with an invalid time format. https:\/\/github.com\/wolfSSL\/wolfssl\/issues\/2657"},{"key":"e_1_3_2_1_55_1","unstructured":"wolfssl. 2019. wolfssl-4.0.0 accepts a certificate with authority key identifier extension field that do not match issuer. https:\/\/github.com\/wolfSSL\/wolfssl\/issues\/2659"},{"key":"e_1_3_2_1_56_1","unstructured":"wolfssl. 2019. wolfssl4.2.0 accepts a certificate whose issuer not matching the subject of CA certificate. https:\/\/github.com\/wolfSSL\/wolfssl\/issues\/2680"},{"key":"e_1_3_2_1_57_1","unstructured":"wolfSSL. 2020. wolfSSL. https:\/\/www.wolfssl.com\/"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Peter E. Yee. 2013. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 6818. 10.17487\/RFC6818","DOI":"10.17487\/RFC6818"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416552"}},"subtitle":["syntax-aware differential testing of certificate validation in SSL\/TLS implementations"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":58,"alternative-id":["10.1145\/3324884.3416552","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416552","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}