{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:08Z","timestamp":1750220588336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2020"],"award-info":[{"award-number":["N00014-18-1-2020"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,13]]},"DOI":"10.1145\/3411502.3418425","type":"proceedings-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T23:20:42Z","timestamp":1604618442000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Feature Isolation in Network Protocol Software Implementations"],"prefix":"10.1145","author":[{"given":"Ze","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Qingzhao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Brandon","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Sanjay Sri Vallabh","family":"Singapuram","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Scott","family":"Mahlke","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"APACHE. 2020. Apache HTTP Server Project. https:\/\/httpd.apache.org\/.  APACHE. 2020. Apache HTTP Server Project. https:\/\/httpd.apache.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359764"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813643"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3273045.3273048"},{"key":"e_1_3_2_1_7_1","unstructured":"The MITRE Corporation. 2008. CVE-2008--2364: mod_proxy_http DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008--2364.  The MITRE Corporation. 2008. CVE-2008--2364: mod_proxy_http DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008--2364."},{"key":"e_1_3_2_1_8_1","unstructured":"The MITRE Corporation. 2011a. CVE-2011-3192: Range header DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3192.  The MITRE Corporation. 2011a. CVE-2011-3192: Range header DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3192."},{"key":"e_1_3_2_1_9_1","unstructured":"The MITRE Corporation. 2011b. CVE-2011--3607: Integer overflow in Apache HTTP server. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011--3607.  The MITRE Corporation. 2011b. CVE-2011--3607: Integer overflow in Apache HTTP server. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011--3607."},{"key":"e_1_3_2_1_10_1","unstructured":"The MITRE Corporation. 2012a. CVE-2012-3499: Apache XSS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3499.  The MITRE Corporation. 2012a. CVE-2012-3499: Apache XSS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-3499."},{"key":"e_1_3_2_1_11_1","unstructured":"The MITRE Corporation. 2012b. CVE-2012-4929: CRIME attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012--4929.  The MITRE Corporation. 2012b. CVE-2012-4929: CRIME attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012--4929."},{"key":"e_1_3_2_1_12_1","unstructured":"The MITRE Corporation. 2013. CVE-2013-3587: BREACH attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3587.  The MITRE Corporation. 2013. CVE-2013-3587: BREACH attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3587."},{"key":"e_1_3_2_1_13_1","unstructured":"The MITRE Corporation. 2014a. CVE-2014-0160: Heartbleed bug. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160.  The MITRE Corporation. 2014a. CVE-2014-0160: Heartbleed bug. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160."},{"key":"e_1_3_2_1_14_1","unstructured":"The MITRE Corporation. 2014b. CVE-2014-0224. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0224.  The MITRE Corporation. 2014b. CVE-2014-0224. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0224."},{"key":"e_1_3_2_1_15_1","unstructured":"The MITRE Corporation. 2015a. CVE-2015-0204: OpenSSL FREAK attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0204.  The MITRE Corporation. 2015a. CVE-2015-0204: OpenSSL FREAK attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0204."},{"key":"e_1_3_2_1_16_1","unstructured":"The MITRE Corporation. 2015b. CVE-2015--2808: RC4 attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-2808.  The MITRE Corporation. 2015b. CVE-2015--2808: RC4 attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-2808."},{"key":"e_1_3_2_1_17_1","unstructured":"The MITRE Corporation. 2015c. CVE-2015-4000: Logjam attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-4000.  The MITRE Corporation. 2015c. CVE-2015-4000: Logjam attack. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-4000."},{"key":"e_1_3_2_1_18_1","unstructured":"The MITRE Corporation. 2015 d. CVE-2015-8659: Dependency cycle DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8659.  The MITRE Corporation. 2015 d. CVE-2015-8659: Dependency cycle DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8659."},{"key":"e_1_3_2_1_19_1","unstructured":"The MITRE Corporation. 2016a. CVE-2016-0777: OpenSSH client information leak. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0777.  The MITRE Corporation. 2016a. CVE-2016-0777: OpenSSH client information leak. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0777."},{"key":"e_1_3_2_1_20_1","unstructured":"The MITRE Corporation. 2016b. CVE-2016-1232: Prosody XMPP dialback vulnerability. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1232.  The MITRE Corporation. 2016b. CVE-2016-1232: Prosody XMPP dialback vulnerability. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1232."},{"key":"e_1_3_2_1_21_1","unstructured":"The MITRE Corporation. 2016c. CVE-2016-1544: HPACK bomb. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016--1544.  The MITRE Corporation. 2016c. CVE-2016-1544: HPACK bomb. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016--1544."},{"key":"e_1_3_2_1_22_1","unstructured":"The MITRE Corporation. 2016 d. CVE-2016-1546: Slow read DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1546.  The MITRE Corporation. 2016 d. CVE-2016-1546: Slow read DoS. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1546."},{"key":"e_1_3_2_1_23_1","unstructured":"The MITRE Corporation. 2016 e. CVE-2016-5387: HTTP_PROXY redirection. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016--5387.  The MITRE Corporation. 2016 e. CVE-2016-5387: HTTP_PROXY redirection. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016--5387."},{"key":"e_1_3_2_1_24_1","unstructured":"The MITRE Corporation. 2017a. CVE-2017-5858: XMPP Message Carbons extension vulnerability. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017--5858.  The MITRE Corporation. 2017a. CVE-2017-5858: XMPP Message Carbons extension vulnerability. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017--5858."},{"key":"e_1_3_2_1_25_1","unstructured":"The MITRE Corporation. 2017b. CVE-2017--9798. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-9798.  The MITRE Corporation. 2017b. CVE-2017--9798. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-9798."},{"key":"e_1_3_2_1_26_1","unstructured":"The MITRE Corporation. 2019. CVE-2009-1191: mod_proxy_ajp data leak. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2009-1191.  The MITRE Corporation. 2019. CVE-2009-1191: mod_proxy_ajp data leak. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2009-1191."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141235.3141236"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01205185"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.146"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018440"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_33_1","unstructured":"OpenSSL. 2020. OpenSSL Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/.  OpenSSL. 2020. OpenSSL Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368826.3377920"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789804"},{"key":"e_1_3_2_1_36_1","unstructured":"Inc. Synopsys. 2020. The Heartbleed Bug. http:\/\/heartbleed.com.  Inc. Synopsys. 2020. The Heartbleed Bug. http:\/\/heartbleed.com."},{"key":"e_1_3_2_1_37_1","unstructured":"The Clang Team. 2020. Clang Compiler User's Manual: GCOV-based Profiling. https:\/\/clang.llvm.org\/docs\/UsersManual.html#gcov-based-profiling.  The Clang Team. 2020. Clang Compiler User's Manual: GCOV-based Profiling. https:\/\/clang.llvm.org\/docs\/UsersManual.html#gcov-based-profiling."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026925"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950395"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372799.3394360"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411502.3418425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3411502.3418425","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411502.3418425","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411502.3418425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:42Z","timestamp":1750195902000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411502.3418425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":40,"alternative-id":["10.1145\/3411502.3418425","10.1145\/3411502"],"URL":"https:\/\/doi.org\/10.1145\/3411502.3418425","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}