{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:24:44Z","timestamp":1757705084819},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.23919\/fmcad.2017.8102263","type":"proceedings-article","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T16:49:00Z","timestamp":1510246140000},"page":"220-229","source":"Crossref","is-referenced-by-count":11,"title":["Automated repair by example for firewalls"],"prefix":"10.23919","author":[{"given":"William T.","family":"Hallahan","sequence":"first","affiliation":[]},{"given":"Ennan","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Ruzica","family":"Piskac","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836119"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"key":"ref31","article-title":"Architecting the Lumeta firewall analyzer","author":"wool","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_49"},{"key":"ref34","article-title":"Verification and synthesis of firewalls using SAT and QBF","author":"zhang","year":"2012","journal-title":"IEEE International conference on Network Protocols (ICNP)"},{"key":"ref10","article-title":"Detecting and resolving packet filter conflicts","author":"adiseshu","year":"2000","journal-title":"19th IEEE International Conference on Computer Communications (INFOCOM)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090406"},{"key":"ref12","article-title":"Hol-TestGen\/fw - An environment for specification-based firewall conformance testing","author":"brucker","year":"2013","journal-title":"10th Theoretical Aspects of Computing (ICTAC)"},{"journal-title":"Cisco Policing and Shaping Overview","year":"0","key":"ref13"},{"journal-title":"Watch What I Do Programming by Demonstration","year":"1993","author":"cypher","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532056"},{"key":"ref16","article-title":"Internet packet filter management and rectangle geometry","author":"eppstein","year":"2001","journal-title":"Symposium on Discrete Algorithms (SODA)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00314-5"},{"journal-title":"Juniper Traffic Policier Overview","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00310-9"},{"key":"ref28","first-page":"197","author":"qian","year":"2001","journal-title":"ACLA A Framework for Access Control List (ACL) Analysis and Optimization"},{"journal-title":"Iptables","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"journal-title":"How can I rate limit SSH connections with iptables","year":"0","key":"ref3"},{"journal-title":"Is there a rule for iptables to limit the amount of SYN packets","year":"0","key":"ref6"},{"journal-title":"Computer Networks","year":"2002","author":"tanenbaum","key":"ref29"},{"journal-title":"iptables issue cannot SSH remote machines","year":"0","key":"ref5"},{"journal-title":"Stack Overflow","year":"0","key":"ref8"},{"journal-title":"Server Fault","year":"0","key":"ref7"},{"journal-title":"Good iptables starting rules for a webserver","year":"0","key":"ref2"},{"journal-title":"iptables Linux User's Manual","year":"2015","key":"ref9"},{"journal-title":"Cannot Block IP","year":"0","key":"ref1"},{"key":"ref20","article-title":"Cp-Miner: A tool for finding copy-paste and related bugs in operating system code","author":"li","year":"2004","journal-title":"Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"ref22","article-title":"Checking beliefs in dynamic networks","author":"lopes","year":"2015","journal-title":"USENIX Symposium on Networked System Design and Implementation (NSDI'07)"},{"journal-title":"Your Wish Is My Command Programming by Example","year":"2001","author":"lieberman","key":"ref21"},{"key":"ref24","article-title":"Z3: An efficient SMT solver","author":"de moura","year":"2008","journal-title":"14th Tools and Algorithms for the Construction and Analysis of Systems (TACAS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"ref26","article-title":"The Margrave tool for firewall analysis","author":"nelson","year":"2010","journal-title":"Proc of the 24th International Conference on Large Installation System Administration (LISA)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/357073.357079"}],"event":{"name":"2017 Formal Methods in Computer-Aided Design (FMCAD)","start":{"date-parts":[[2017,10,2]]},"location":"Vienna","end":{"date-parts":[[2017,10,6]]}},"container-title":["2017 Formal Methods in Computer Aided Design (FMCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8093672\/8102222\/08102263.pdf?arnumber=8102263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T17:40:55Z","timestamp":1513014055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8102263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.23919\/fmcad.2017.8102263","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}