{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:39:22Z","timestamp":1770349162453,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,29]]},"DOI":"10.23919\/wons60642.2024.10449510","type":"proceedings-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:00:22Z","timestamp":1709578822000},"page":"17-24","source":"Crossref","is-referenced-by-count":3,"title":["AMFuzz: Black-Box Fuzzing of 5G Core Networks"],"prefix":"10.23919","author":[{"given":"Francesco","family":"Mancini","sequence":"first","affiliation":[{"name":"Univ. of Rome Tor Vergata,CNIT NAM Lab,Rome,Italy"}]},{"given":"Sara","family":"Da Canal","sequence":"additional","affiliation":[{"name":"Univ. of Rome Tor Vergata,Rome,Italy"}]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Univ. of Rome Tor Vergata,CNIT,Rome,Italy"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Security in 5G Specifications - Controls in 3GPP","author":"Enisa","year":"2021","journal-title":"European Union Agency for Cybersecurity (ENISA), Tech. Rep."},{"key":"ref2","first-page":"1043","article-title":"AmpFuzz: Fuzzing for am-plification DDoS vulnerabilities","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Krupp"},{"key":"ref3","first-page":"5039","article-title":"KextFuzz: Fuzzing macOS kernel EXTensions on apple silicon via exploiting mitigations","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yin"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510228"},{"key":"ref5","volume-title":"The challenges of fuzzing 5g protocols","author":"Tedman","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref7","volume-title":"Genetic algorithm in code coverage guided fuzz testing","author":"Jaaskela","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"ref9","article-title":"A review of fuzzing tools and methods","author":"Fell","year":"2017","journal-title":"PenTest Magazine"},{"key":"ref10","article-title":"AFL++: Combining incremental steps of fuzzing research","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534376"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00038"},{"key":"ref15","first-page":"1325","article-title":"DoLTEst: In-depth downlink negative testing framework for LTE devices","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Park"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.45"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob52687.2021.9606317"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001673"},{"key":"ref19","volume-title":"5 Greplay","author":"Montimage","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470079"},{"key":"ref21","volume-title":"OSS-Fuzz - googles continuous fuzzing service for open source software","author":"Serebryany","year":"2017"},{"key":"ref22","volume-title":"Structure-aware fuzzing with libfuzzer","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605044"},{"key":"ref24","volume-title":"Afl technical details","year":"2019"},{"key":"ref25","article-title":"Replication, reproduction and re-analysis: Three ways for verifying experimental findings","volume-title":"1st International Workshop on Replication in Empirical Software Engineering Research (RESER2010)","author":"Gomez"},{"key":"ref26","volume-title":"Pycrate","year":"2016"},{"key":"ref27","volume-title":"Ueransim","year":"2021"},{"key":"ref28","volume-title":"Open5GS","author":"Lee","year":"2017"},{"key":"ref29","volume-title":"National Yang Ming Chiao Tung University","year":"2021"},{"key":"ref30","volume-title":"Open Air Interface","year":"2020"}],"event":{"name":"2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)","location":"Chamonix, France","start":{"date-parts":[[2024,1,29]]},"end":{"date-parts":[[2024,1,31]]}},"container-title":["2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10449489\/10449498\/10449510.pdf?arnumber=10449510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:33:20Z","timestamp":1709861600000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10449510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,29]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/wons60642.2024.10449510","relation":{},"subject":[],"published":{"date-parts":[[2024,1,29]]}}}