{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:06Z","timestamp":1755882606116,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Agence de l'innovation de D\u00e9fense"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664506","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7382-9952","authenticated-orcid":false,"given":"Arthur","family":"Tran Van","sequence":"first","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0558-5015","authenticated-orcid":false,"given":"Olivier","family":"Levillain","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1344-4167","authenticated-orcid":false,"given":"Herve","family":"Debar","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. CVE - CVE-2014-0224. Available from MITRE CVE-2014-0160.. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-0224"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Systerel \/ S2OPC \u00b7 GitLab. https:\/\/gitlab.com\/systerel\/S2OPC"},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Official OPC UA.Net Standard Samples from the OPC Foundation. https:\/\/github.com\/OPCFoundation\/UA-.NETStandard-Samples original-date: 2020-05-28T13:53:11Z."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. opcua-asyncio. https:\/\/github.com\/FreeOpcUa\/opcua-asyncio original-date: 2018-08-02T07:45:42Z."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. open62541. https:\/\/github.com\/open62541\/open62541 original-date: 2013-12-20T08:45:05Z."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.371.1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_1_8_1","unstructured":"Georges Bossert. 2023. pylstar : An implementation of the LSTAR Grammatical Inference Algorithm. https:\/\/github.com\/gbossert\/pylstar original-date: 2015-11-17T12:37:55Z."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423666"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00009"},{"key":"e_1_3_2_1_12_1","volume-title":"Analysis of DTLS Implementations Using Protocol State Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Fiterau-Brostean Paul","year":"2020","unstructured":"Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, and Juraj Somorovsky. 2020. Analysis of DTLS Implementations Using Protocol State Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2523\u20132540. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/fiterau-brostean"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23068"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092282.3092289"},{"key":"e_1_3_2_1_16_1","unstructured":"OPC Foundation. 2022. OPC Unified Architecture Mappings. Release 1.05.01."},{"key":"e_1_3_2_1_17_1","unstructured":"OPC Foundation. 2022. OPC Unified Architecture Part 2 :Security Model. Release 1.04."},{"key":"e_1_3_2_1_18_1","unstructured":"OPC Foundation. 2022. OPC Unified Architecture Part 4 :Services. Release 1.05.00."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_16"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180232"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_31"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05089-3_14"},{"key":"e_1_3_2_1_24_1","unstructured":"Qinying Wang Shouling Ji Yuan Tian Xuhong Zhang Binbin Zhao Yuhong Kan Zhaowei Lin Changting Lin Shuiguang Deng Alex\u00a0X. Liu and Raheem Beyah. 2021. {MPInspector}: A Systematic and Automatic Approach for Evaluating the Security of {IoT} Messaging Protocols. 4205\u20134222. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/wang-qinying"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1871\/1\/012102"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:54:04Z","timestamp":1755881644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":25,"alternative-id":["10.1145\/3664476.3664506","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664506","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}