{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:06Z","timestamp":1755225186873,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"name":"This work was supported by the European Commission under the Horizon Europe Programme, as part of the project LAZARUS","award":["101070303"],"award-info":[{"award-number":["101070303"]}]},{"name":"This work was supported by the European Commission under the Horizon Europe Programme, as part of the project LAZARUS","award":["101070303"],"award-info":[{"award-number":["101070303"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3733876","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"955-970","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["AWOSE: Probabilistic State Model for Consensus Algorithms\u2019 Fuzzing Frameworks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4751-2195","authenticated-orcid":false,"given":"Tannishtha","family":"Devgun","sequence":"first","affiliation":[{"name":"University of Padua, Italy, Padua, Italy and University of Camerino, Italy, Cmaerino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Padua, Italy, Padua, Italy and Lovely Professional University, India, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[{"name":"University of Padua, Italy, Padua, Italy and Lovely Professional University, India, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[{"name":"University of Padua, Italy, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Italy, Padua, Italy and \u00d6rebro University, \u00d6rebro, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"F. Ma Y. Chen Meng Ren Y. Zhou Yu Jiang T. Chen H. Li J. Sun LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols Network and Distributed System Security (NDSS) Symposium 2023 doi: https:\/\/dx.doi.org\/10.14722\/ndss.2023.24078.","DOI":"10.14722\/ndss.2023.24078"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"A. Singh G. Kumar R. Saha M. Conti M. Alazab R. Thomas A survey and taxonomy of consensus protocols for blockchains Journal of Systems Architecture vol. 127 2022 pp. 1-27.","DOI":"10.1016\/j.sysarc.2022.102503"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"X. Jie C. Wang X. Jia A survey of blockchain consensus protocols ACM Computing Surveys 55.13s 2023 pp. 1-35.","DOI":"10.1145\/3579845"},{"key":"e_1_3_3_2_5_2","unstructured":"S. Nakamoto Bitcoin: A peer-to-peer electronic cash system 2008."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"J. Garay A. Kiayias N. Leonardos The Bitcoin Backbone Protocol: Analysis and Applications 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer Berlin Heidelberg 2015.","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"D. Phil R. Pass E. Shi Snow white: Robustly reconfigurable consensus and applications to provably secure proof of stake Financial Cryptography and Data Security: 23rd International Conference FC 2019 2019 Revised Selected Papers 23 Springer International Publishing 2019.","DOI":"10.1007\/978-3-030-32101-7_2"},{"key":"e_1_3_3_2_8_2","unstructured":"CASTRO Miguel et al. Practical byzantine fault tolerance. In: OsDI. 1999. p. 173-186."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"S. Islam M. J. Islam M. Hossain S. Noor K. S. Kwak S. M. R. Islam A Survey on Consensus Algorithms in Blockchain-Based Applications: Architecture Taxonomy and Operational Issues IEEE Access vol. 11 pp. 39066-39082 2023.","DOI":"10.1109\/ACCESS.2023.3267047"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Q. Bao B. Li T. Hu X. Sun A survey of blockchain consensus safety and security: State-of-the-art challenges and future work Journal of Systems and Software vol. 196 2023 pp. 1-25.","DOI":"10.1016\/j.jss.2022.111555"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"A. K. Yadav K. Singh A. H. Amin L. Almutairi T. R. Alsenani A. Ahmadian A comparative study on consensus mechanism with security threats and future scopes: Blockchain Computer Communications Vol. 201 2023 pp. 102-115.","DOI":"10.1016\/j.comcom.2023.01.018"},{"key":"e_1_3_3_2_12_2","unstructured":"C. Harper Ethereum\u2019s \u2018Unannounced Hard Fork\u2019 Was Trying to Prevent the Very Disruption It Caused 2020 available at: https:\/\/www.coindesk.com\/tech\/2020\/11\/11\/ethereums-unannounced-hard-fork-was-trying-to-prevent-the-very-disruption-it-caused\/ accessed on: 10-12-2023."},{"key":"e_1_3_3_2_13_2","unstructured":"Oliver J. Freeman FRSA What is a 51% Attack? Unraveling the Cryptocurrency Threat available at: https:\/\/medium.com\/OjFRSA\/what-is-a-51-attack-unravelling-the-cryptocurrency-threat-82235af44082 2023 accessed on: 10-12-2023."},{"key":"e_1_3_3_2_14_2","unstructured":"X. Zhang C. Zhang X. Li Z. Du Y. Li Y. Zheng Y. Li B. Mao Y. Liu R. H. Deng ASurvey of Protocol Fuzzing available at: accessed on: 12-05-2024"},{"key":"e_1_3_3_2_15_2","unstructured":"P. Godefroid M. Y. Levin D. A. Molnar Automated Whitebox Fuzz Testing Network and Distributed System Security Symposium 2008."},{"key":"e_1_3_3_2_16_2","unstructured":"A. Takanen Fuzzing: Helping to Avoid Zero-Day Attack 2010 available at: https:\/\/www.continuitycentral.com\/feature0754.html accessed on: 12-12-2023."},{"key":"e_1_3_3_2_17_2","unstructured":"libFuzzer and AFL available at: https:\/\/google.github.io\/clusterfuzz\/setting-up-fuzzing\/libfuzzer-and-afl\/ accessed on: 15-12-2023."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"T. Rontti A. M. Juuso and A. Takanen Preventing DoS attacks in NGN networks with proactive specification-based fuzzing IEEE Communications Magazine vol. 50 no. 9 2012 pp. 164-170.","DOI":"10.1109\/MCOM.2012.6295728"},{"key":"e_1_3_3_2_19_2","unstructured":"M. Eddington protocol-fuzzer-ce available at: https:\/\/gitlab.com\/gitlab-org\/security-products\/protocol-fuzzer-ce 2021 accessed on: 20-12-2023."},{"key":"e_1_3_3_2_20_2","unstructured":"Y. Yang T. Kim B. G. Chun Finding consensus bugs in Ethereum via multi-transaction differential fuzzing 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21) 2021 pp. 349\u2013365."},{"key":"e_1_3_3_2_21_2","unstructured":"S. Bano A. Sonnino A. Chursin D. Perelman Z. Li A. Ching D. Malkhi Twins: Bft systems made robust 25th International Conference on Principles of Distributed Systems (OPODIS 2021) Schloss Dagstuhl-Leibniz-Zentrum f\u00a8ur Informatik 2022 pp. 1-29."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Y. Chen F. Ma Y. Zhou Y. Jiang T. Chen and J. Sun Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model IEEE Symposium on Security and Privacy (SP) 2023 pp. 2517-2532.","DOI":"10.1109\/SP46215.2023.10179386"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Z. Guo N. Li Fuzz Testing based on Sulley Framework Current Trends in Computer Science and Mechanical Automation vol. 1 Selected Papers from CSMA2016 edited by Shawn X. Wang Warsaw Poland: De Gruyter Open Poland 2022 pp. 181-187.","DOI":"10.1515\/9783110584974-022"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Y. Zhang N. Zhong W.You Y. Zou K. Jian J. Xu J. Sun B. Liu W. Huo NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices Cybersecurity vol. 5 no. 21 2022 pp. 1-21.","DOI":"10.1186\/s42400-022-00120-1"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"C. Song X. Zhou Q. Yin X. He H. Zhang K. Lu P-Fuzz: A Parallel Grey-Box Fuzzing Framework Applied Sciences vol. 9 no. 23 2019 pp. 1-14.","DOI":"10.3390\/app9235100"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"G. Han Z. Li P. Tang C. Hu S. Guo FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks \" 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys) 2022 pp. 1601-1608.","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00244"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"P. Srivastava H. Peng J. Li H. Okhravi H. Shrobe M. Payer FirmFuzz: Automated IoT Firmware Introspection and Analysis Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things (IoT S&P\u201919). Association for Computing Machinery 2019 pp. 15\u201321.","DOI":"10.1145\/3338507.3358616"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Ana Sokolova Erik P. de Vink Probabilistic Automata: System Types Parallel Composition and Comparison In: Baier C. Haverkort B.R. Hermanns H. Katoen JP. Siegle M. (eds) Validation of Stochastic Systems. Lecture Notes in Computer Science vol 2925. Springer Berlin Heidelberg 2004 pp. 1-43.","DOI":"10.1007\/978-3-540-24611-4_1"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"D. Lefebvre C. Seatzu C. N. Hadjicostis A. Giua Logical and probabilistic aspects of state estimation for Markovian systems 62nd IEEE Conference on Decision and Control (CDC) 2023 pp. 6929-6935.","DOI":"10.1109\/CDC49753.2023.10383800"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"J. Xun The Research of Markov Chain Application under Two Common Real World Examples Journal of Physics: Conference Series 11th International Conference on Applied Physics and Mathematics (ICAPM 2021) vol. 1936 2021 pp. 2-8.","DOI":"10.1088\/1742-6596\/1936\/1\/012004"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"B. Mor S. Garhwal A. Kumar A Systematic Review of Hidden Markov Models and Their Applications Archives of Computational Methods in Engineering vol. 28 2021 pp. 1429\u20131448.","DOI":"10.1007\/s11831-020-09422-4"},{"key":"e_1_3_3_2_32_2","unstructured":"M. A. Kouritzin Markov Observation Models arXiv:https:\/\/arXiv.org\/abs\/2208.06368 available at: https:\/\/arxiv.org\/abs\/2208.06368 accessed on: 01-01-2024."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"L. Fu DD. Ge A Gradient Descent Method for Estimating the Markov Chain Choice Model Journal of the Operations Research Society of China vol. 11 2023 pp. 371\u2013381.","DOI":"10.1007\/s40305-021-00365-6"},{"key":"e_1_3_3_2_34_2","unstructured":"ONGARO Diego; OUSTERHOUT John. In search of an understandable consensus algorithm. In: 2014 USENIX annual technical conference (USENIX ATC 14). 2014. pp. 305-319."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"LAMPORT Leslie. Paxos made simple. ACM SIGACT News (Distributed Computing Column) 32 4 (Whole Number 121 December 2001) 2001 pp. 51-58.","DOI":"10.1145\/568425.568433"},{"key":"e_1_3_3_2_36_2","unstructured":"BACK Adam et al. Hashcash-a denial of service countermeasure. 2002."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"MINGXIAO Du et al. A review on consensus algorithm of blockchain. In: 2017 IEEE international conference on systems man and cybernetics (SMC). IEEE 2017. pp. 2567-2572.","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Zhang S. and Lee J.-H. 2020. Analysis of the main consensus protocols of blockchain. ICT Express. Elsevier BV. pp. 93-97.","DOI":"10.1016\/j.icte.2019.08.001"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Zamir L.; Nojoumian M. Localized State-Change Consensus in Immense and Highly Dynamic Environments. Cryptography 2022 6 23.","DOI":"10.3390\/cryptography6020023"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme Van-Thuan Pham and Abhik Roychoudhury Coverage- based Greybox Fuzzing As Markov Chain In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201916) 2016 pp. 1032-1043.","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"H. Al Salem and J. Song Grammar-based Fuzzing Tool Using Markov Chain Model to Generate New Fuzzing Inputs International Conference on Computational Science and Computational Intelligence (CSCI) Las Vegas NV USA 2021 pp. 1924-1930.","DOI":"10.1109\/CSCI54926.2021.00358"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Mor B. Garhwal S. and Kumar A. A Systematic Review of Hidden Markov Models and Their Applications. Arch Computat Methods Eng 28 2021 pp. 1429\u20131448.","DOI":"10.1007\/s11831-020-09422-4"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Ning Ge S. Nakajima and M. Pantel Hidden Markov model based automated fault localization for integration testing 4th International Conference on Software Engineering and Service Science IEEE Beijing 2013 pp. 184-187.","DOI":"10.1109\/ICSESS.2013.6615284"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Bharathi R. Selvarani R. Hidden Markov Model Approach for Software Reliability Estimation with Logic Error. Int. J. Autom. Comput. 17 2020 pp.305\u2013320.","DOI":"10.1007\/s11633-019-1214-7"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"R. Malhotra C. Singla and D. Farooque Comparison of Hidden Markov Model with other Machine Learning Techniques in Software Defect Prediction 7th International Conference for Convergence in Technology (I2CT) IEEE India 2022 pp. 1-5.","DOI":"10.1109\/I2CT54291.2022.9824549"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3733876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:34:13Z","timestamp":1755070453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3733876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":44,"alternative-id":["10.1145\/3708821.3733876","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3733876","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}