{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:20Z","timestamp":1750220660012,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR0011-19-C-0073"],"award-info":[{"award-number":["HR0011-19-C-0073"]}]},{"name":"Air Force Research Laboratory (AFRL)","award":["FA8750-19-C-0039"],"award-info":[{"award-number":["FA8750-19-C-0039"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,13]]},"DOI":"10.1145\/3411506.3417599","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:13:27Z","timestamp":1604351607000},"page":"25-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Discovery and Synthesis of Checksum Algorithms from Binary Data Samples"],"prefix":"10.1145","author":[{"given":"Lauren","family":"Labell","sequence":"first","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Jared","family":"Chandler","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Kathleen","family":"Fisher","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Cook Gregory","year":"2020","unstructured":"Gregory Cook . 2020 . CRC RevEng . Retrieved June 23, 2020 from http:\/\/reveng.sourceforge.net\/ Gregory Cook. 2020. CRC RevEng. Retrieved June 23, 2020 from http:\/\/reveng.sourceforge.net\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Exchange Stack","year":"2014","unstructured":"Stack Exchange . 2014 . Guessing CRC checksum algorithm . Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com\/questions\/4460 Stack Exchange. 2014. Guessing CRC checksum algorithm. Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com\/questions\/4460"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Exchange Stack","year":"2014","unstructured":"Stack Exchange . 2014 . Reversing simple message + checksum pairs (32 bytes) . Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com\/questions\/6927 Stack Exchange. 2014. Reversing simple message + checksum pairs (32 bytes). Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com\/questions\/6927"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Exchange Stack","year":"2020","unstructured":"Stack Exchange . 2020 . Reverse Engineering Stack Exchange . Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com Stack Exchange. 2020. Reverse Engineering Stack Exchange. Retrieved June 23, 2020 from https:\/\/reverseengineering.stackexchange.com"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065046"},{"volume-title":"The minimum description length principle","author":"Gr\u00fcnwald Peter D","key":"e_1_3_2_1_7_1","unstructured":"Peter D Gr\u00fcnwald and Abhijit Grunwald . 2007. The minimum description length principle . MIT press . Peter D Gr\u00fcnwald and Abhijit Grunwald. 2007. The minimum description length principle. MIT press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1836089.1836091"},{"volume-title":"Data communications, computer networks and open systems","author":"Halsall Fred","key":"e_1_3_2_1_9_1","unstructured":"Fred Halsall . 1995. Data communications, computer networks and open systems . Addison Wesley Longman Publishing Co., Inc. 102--112 pages. Fred Halsall. 1995. Data communications, computer networks and open systems. Addison Wesley Longman Publishing Co., Inc. 102--112 pages."},{"key":"e_1_3_2_1_10_1","volume-title":"Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis","author":"Kleber Stephan","year":"2018","unstructured":"Stephan Kleber , Lisa Maile , and Frank Kargl . 2018. Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis . IEEE Communications Surveys & Tutorials 2018 (2018). Stephan Kleber, Lisa Maile, and Frank Kargl. 2018. Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis. IEEE Communications Surveys & Tutorials 2018 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/357084.357090"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2840724"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Overflow Stack","year":"2020","unstructured":"Stack Overflow . 2020 . Stack Overflow . Retrieved June 23, 2020 from https:\/\/stackoverflow.com\/ Stack Overflow. 2020. Stack Overflow. Retrieved June 23, 2020 from https:\/\/stackoverflow.com\/"},{"volume-title":"Computer networks: a systems approach","author":"Peterson Larry L","key":"e_1_3_2_1_14_1","unstructured":"Larry L Peterson and Bruce S Davie . 2007. Computer networks: a systems approach . Elsevier . 93--101 pages. Larry L Peterson and Bruce S Davie. 2007. Computer networks: a systems approach. Elsevier. 93--101 pages."},{"volume-title":"13th {USENIX} Workshop on Offensive Technologies (WOOT 19).","author":"Pohl Johannes","key":"e_1_3_2_1_15_1","unstructured":"Johannes Pohl and Andreas Noack . 2019. Automatic wireless protocol reverse engineering . In 13th {USENIX} Workshop on Offensive Technologies (WOOT 19). Johannes Pohl and Andreas Noack. 2019. Automatic wireless protocol reverse engineering. In 13th {USENIX} Workshop on Offensive Technologies (WOOT 19)."},{"key":"e_1_3_2_1_16_1","volume-title":"Internet Control Message Protocol","author":"Postel John","year":"1981","unstructured":"John Postel . 1981. Internet Control Message Protocol ; RFC792. ARPANETWorking Group Requests for Comments 792 ( 1981 ). John Postel. 1981. Internet Control Message Protocol; RFC792. ARPANETWorking Group Requests for Comments 792 (1981)."},{"key":"e_1_3_2_1_17_1","volume-title":"September","author":"Postel Jon","year":"1981","unstructured":"Jon Postel . 1990. RFC 791: Internet Protocol , September 1981 . Darpa Internet Protocol Specification ( 1990). Jon Postel. 1990. RFC 791: Internet Protocol, September 1981. Darpa Internet Protocol Specification (1990)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_20_1","unstructured":"Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education.  Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P","author":"Wagner David","year":"2000","unstructured":"David Wagner and R Dean . 2000 . Intrusion detection via static analysis . In Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001. IEEE, 156--168. David Wagner and R Dean. 2000. Intrusion detection via static analysis. In Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001. IEEE, 156--168."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 15th Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411506.3417599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411506.3417599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:37Z","timestamp":1750197757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411506.3417599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":22,"alternative-id":["10.1145\/3411506.3417599","10.1145\/3411506"],"URL":"https:\/\/doi.org\/10.1145\/3411506.3417599","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}