{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:00:02Z","timestamp":1764403202743,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangdong Provincial Key R&D Plan Project","award":["2019B010139001"],"award-info":[{"award-number":["2019B010139001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902138"],"award-info":[{"award-number":["61902138"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Wuhan Applied Foundational Frontier Project","award":["2020010601012188"],"award-info":[{"award-number":["2020010601012188"]}]},{"name":"Hubei Province Key R&D Technology Special Innovation Project","award":["2021BAA032"],"award-info":[{"award-number":["2021BAA032"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564650","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"756-768","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7152-116X","authenticated-orcid":false,"given":"Zhechang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5365-904X","authenticated-orcid":false,"given":"Bin","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China and Shenzhen Huazhong University of Science and Technology Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9302-8878","authenticated-orcid":false,"given":"Kehan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. AFL (american fuzzy lop) \u2014 AFL 2.53b Documentation. https:\/\/afl-1.readthedocs.io\/en\/latest\/. (Accessed: 2022-05).  2022. AFL (american fuzzy lop) \u2014 AFL 2.53b Documentation. https:\/\/afl-1.readthedocs.io\/en\/latest\/. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. afl-cve: A Collection of Vulnerabilities Discovered by the AFL Fuzzer (afl-fuzz). https:\/\/github.com\/mrash\/afl-cve. (Accessed: 2022-05).  2022. afl-cve: A Collection of Vulnerabilities Discovered by the AFL Fuzzer (afl-fuzz). https:\/\/github.com\/mrash\/afl-cve. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Boofuzz: A Fork and Successor of the Sulley Fuzzing Framework. https:\/\/github.com\/jtpereyda\/boofuzz. (Accessed: 2022-05).  2022. Boofuzz: A Fork and Successor of the Sulley Fuzzing Framework. https:\/\/github.com\/jtpereyda\/boofuzz. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Bugs Found by Syzkaller. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs.md. (Accessed: 2022-06).  2022. Bugs Found by Syzkaller. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs.md. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. CVE-2018-14568. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14568. (Accessed: 2022-06).  2022. CVE-2018-14568. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14568. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. CVE-2019-1010279. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-1010279. (Accessed: 2022-06).  2022. CVE-2019-1010279. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-1010279. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_7_1","unstructured":"2022. CVE-2019-18792. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-18792. (Accessed: 2022-06).  2022. CVE-2019-18792. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-18792. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. CVE-2021-1236. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-1236. (Accessed: 2022-06).  2022. CVE-2021-1236. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-1236. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_9_1","unstructured":"2022. Fuzzing - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Fuzzing. (Accessed: 2022-06).  2022. Fuzzing - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Fuzzing. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Honggfuzz. https:\/\/google.github.io\/honggfuzz\/. (Accessed: 2022-06).  2022. Honggfuzz. https:\/\/google.github.io\/honggfuzz\/. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Iptables(8) - Linux Man Page. https:\/\/linux.die.net\/man\/8\/iptables. (Accessed: 2022-06).  2022. Iptables(8) - Linux Man Page. https:\/\/linux.die.net\/man\/8\/iptables. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_12_1","unstructured":"2022. LibFuzzer - A Library For Coverage-guided Fuzz Testing. http:\/\/llvm.org\/docs\/LibFuzzer.html. (Accessed: 2022-06).  2022. LibFuzzer - A Library For Coverage-guided Fuzz Testing. http:\/\/llvm.org\/docs\/LibFuzzer.html. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. OSS-Fuzz - Continuous Fuzzing For Open Source Software. https:\/\/github.com\/google\/oss-fuzz. (Accessed: 2022-06).  2022. OSS-Fuzz - Continuous Fuzzing For Open Source Software. https:\/\/github.com\/google\/oss-fuzz. (Accessed: 2022-06)."},{"volume-title":"RFC 1323: TCP Extensions for High Performance. https:\/\/www.rfc-editor","year":"2022","key":"e_1_3_2_1_14_1","unstructured":"2022. RFC 1323: TCP Extensions for High Performance. https:\/\/www.rfc-editor .org\/rfc\/rfc1323.html. ( Accessed : 2022 -06). 2022. RFC 1323: TCP Extensions for High Performance. https:\/\/www.rfc-editor.org\/rfc\/rfc1323.html. (Accessed: 2022-06)."},{"volume-title":"RFC 7323: TCP Extensions for High Performance. https:\/\/www.rfc-editor","year":"2022","key":"e_1_3_2_1_15_1","unstructured":"2022. RFC 7323: TCP Extensions for High Performance. https:\/\/www.rfc-editor .org\/rfc\/rfc7323.html. ( Accessed : 2022 -06). 2022. RFC 7323: TCP Extensions for High Performance. https:\/\/www.rfc-editor.org\/rfc\/rfc7323.html. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_16_1","unstructured":"2022. RFC 793 - Transmission Control Protocol. https:\/\/datatracker.ietf.org\/doc\/html\/rfc793. (Accessed: 2022-06).  2022. RFC 793 - Transmission Control Protocol. https:\/\/datatracker.ietf.org\/doc\/html\/rfc793. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_17_1","unstructured":"2022. Snort++. https:\/\/snort.org\/snort3. (Accessed: 2022-05).  2022. Snort++. https:\/\/snort.org\/snort3. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_18_1","unstructured":"2022. Snort Rules and IDS Software Download. https:\/\/snort.org\/downloads##snort-downloads. (Accessed: 2022-05).  2022. Snort Rules and IDS Software Download. https:\/\/snort.org\/downloads##snort-downloads. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_19_1","unstructured":"2022. StateDiver. https:\/\/github.com\/CGCL-codes\/StateDiver. (Accessed: 2022-10).  2022. StateDiver. https:\/\/github.com\/CGCL-codes\/StateDiver. (Accessed: 2022-10)."},{"key":"e_1_3_2_1_20_1","unstructured":"2022. Suricata. https:\/\/suricata.io\/. (Accessed: 2022-05).  2022. Suricata. https:\/\/suricata.io\/. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_21_1","unstructured":"2022. Syzkaller: An Unsupervised Coverage-Guided Kernel Fuzzer. https:\/\/github.com\/google\/syzkaller. (Accessed: 2022-05).  2022. Syzkaller: An Unsupervised Coverage-Guided Kernel Fuzzer. https:\/\/github.com\/google\/syzkaller. (Accessed: 2022-05)."},{"key":"e_1_3_2_1_22_1","unstructured":"2022. Themis Attacks. https:\/\/github.com\/seclab-ucr\/Themis\/tree\/main\/attacks\/single. (Accessed: 2022-06).  2022. Themis Attacks. https:\/\/github.com\/seclab-ucr\/Themis\/tree\/main\/attacks\/single. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_23_1","unstructured":"2022. What Is Deep Packet Inspection (DPI)?https:\/\/www.techtarget.com\/searchnetworking\/definition\/deep-packet-inspection-DPI. (Accessed: 2022-06).  2022. What Is Deep Packet Inspection (DPI)?https:\/\/www.techtarget.com\/searchnetworking\/definition\/deep-packet-inspection-DPI. (Accessed: 2022-06)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811398031"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 14th Network and Distributed System Security Symposium.","author":"Borisov Nikita","year":"2007","unstructured":"Nikita Borisov , David Brumley , Helen\u00a0 J Wang , John Dunagan , Pallavi Joshi , and Chuanxiong Guo . 2007 . Generic Application-Level Protocol Analyzer and Its Language . In Proceedings of the 14th Network and Distributed System Security Symposium. Nikita Borisov, David Brumley, Helen\u00a0J Wang, John Dunagan, Pallavi Joshi, and Chuanxiong Guo. 2007. Generic Application-Level Protocol Analyzer and Its Language. In Proceedings of the 14th Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0247-x"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, Vol.\u00a08. 209\u2013224","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, Vol.\u00a08. 209\u2013224 . Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, Vol.\u00a08. 209\u2013224."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2837889"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831156"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 15th USENIX Security Symposium. 257\u2013272","author":"Dreger Holger","year":"2006","unstructured":"Holger Dreger and Anja Feldmann . 2006 . Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection . In Proceedings of the 15th USENIX Security Symposium. 257\u2013272 . Holger Dreger and Anja Feldmann. 2006. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In Proceedings of the 15th USENIX Security Symposium. 257\u2013272."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2017.8275301"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427662"},{"key":"e_1_3_2_1_42_1","unstructured":"Kostya Serebryany. 2016. Sanitize Fuzz and Harden Your C++ Code. USENIX Association San Francisco CA.  Kostya Serebryany. 2016. Sanitize Fuzz and Harden Your C++ Code. USENIX Association San Francisco CA."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2011.6138545"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 21st USENIX Security Symposium. 16\u201332","author":"Stringhini Gianluca","year":"2012","unstructured":"Gianluca Stringhini , Manuel Egele , Apostolis Zarras , Thorsten Holz , Christopher Kruegel , and Giovanni Vigna . 2012 . B@bel: Leveraging Email Delivery for Spam Mitigation . In Proceedings of the 21st USENIX Security Symposium. 16\u201332 . Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. 2012. B@bel: Leveraging Email Delivery for Spam Mitigation. In Proceedings of the 21st USENIX Security Symposium. 16\u201332."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916624"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24083"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474370.3485669"},{"key":"e_1_3_2_1_49_1","first-page":"1","article-title":"Fuzzing","volume":"54","author":"Xiaogang Zhu","year":"2022","unstructured":"Zhu Xiaogang , Wen Sheng , Camtepe Seyit , and Xiang Yang . 2022 . Fuzzing : A Survey for Roadmap. Comput. Surveys 54 , 11s (2022), 1 \u2013 36 . Zhu Xiaogang, Wen Sheng, Camtepe Seyit, and Xiang Yang. 2022. Fuzzing: A Survey for Roadmap. Comput. Surveys 54, 11s (2022), 1\u201336.","journal-title":"A Survey for Roadmap. Comput. Surveys"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 28th USENIX Security Symposium. 1099\u20131114","author":"Zheng Yaowen","year":"2019","unstructured":"Yaowen Zheng , Ali Davanian , Heng Yin , Chengyu Song , Hongsong Zhu , and Limin Sun . 2019 . FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation . In Proceedings of the 28th USENIX Security Symposium. 1099\u20131114 . Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. In Proceedings of the 28th USENIX Security Symposium. 1099\u20131114."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 2021 USENIX Annual Technical Conference. 489\u2013502","author":"Zou Yong-Hao","year":"2021","unstructured":"Yong-Hao Zou , Jia-Ju Bai , Jielong Zhou , Jianfeng Tan , Chenggang Qin , and Shi-Min Hu . 2021 . TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing . In Proceedings of the 2021 USENIX Annual Technical Conference. 489\u2013502 . Yong-Hao Zou, Jia-Ju Bai, Jielong Zhou, Jianfeng Tan, Chenggang Qin, and Shi-Min Hu. 2021. TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing. In Proceedings of the 2021 USENIX Annual Technical Conference. 489\u2013502."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:12Z","timestamp":1750183752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":51,"alternative-id":["10.1145\/3564625.3564650","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3564650","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}