{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:20Z","timestamp":1740102260121,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607222","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"412-425","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9806-9054","authenticated-orcid":false,"given":"Jingting","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2126-663X","authenticated-orcid":false,"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7230-5076","authenticated-orcid":false,"given":"Qingfang","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8974-1565","authenticated-orcid":false,"given":"Ping","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2547-8376","authenticated-orcid":false,"given":"Lili","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7121-1196","authenticated-orcid":false,"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2009. Natural Language Processing with Python. http:\/\/www.nltk.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. beSTORM Black Box Testing. https:\/\/beyondsecurity.com\/solutions\/bestorm.html."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. boofuzz: Network Protocol Fuzzing for Humans. https:\/\/boofuzz.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. PEACH FUZZER. https:\/\/www.peach.tech\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. The Z3 Theorem Prover. https:\/\/github.com\/Z3Prover\/z3."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. The BIRD Internet Routing Daemon. https:\/\/bird.network.cz\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. BusyBox. https:\/\/www.busybox.net\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. DHCPCD. https:\/\/roy.marples.name\/projects\/dhcpcd\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. The FRRouting Protocol Suite. https:\/\/frrouting.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Internet Systems Consortium(ISC) DHCP. https:\/\/www.isc.org\/dhcp\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. The OpenBSD project produces a FREE multi-platform 4.4BSD-based UNIX-like operating system.http:\/\/www.openbsd.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. freebsd. https:\/\/www.freebsd.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2022. ntp. https:\/\/github.com\/ntp-project\/ntp."},{"key":"e_1_3_2_1_15_1","unstructured":"2022. NTPSec. https:\/\/www.ntpsec.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2022. wolfssl. https:\/\/www.wolfssl.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. Bradner. 1997. Key words for use in RFCs to Indicate Requirement Levels. https:\/\/www.rfc-editor.org\/rfc\/rfc2119\/.","DOI":"10.17487\/rfc2119"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180226"},{"key":"e_1_3_2_1_19_1","unstructured":"E. Chen. 2019. Support for Long-lived BGP Graceful Restart. https:\/\/datatracker.ietf.org\/doc\/draft-uttaro-idr-bgp-persistence\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00081"},{"key":"e_1_3_2_1_21_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Yi","year":"2022","unstructured":"Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, and Dongfang Zhao. 2022. Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 17\u201334. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/chen-yi"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"M. Cotton. 2017. Guidelines for Writing an IANA Considerations Section in RFCs. https:\/\/www.rfc-editor.org\/rfc\/rfc8126.","DOI":"10.17487\/RFC8126"},{"key":"e_1_3_2_1_23_1","unstructured":"J.Martin D.\u00a0Mills U.\u00a0Delaware. 2010. Network Time Protocol Version 4: Protocol and Algorithms Specification. https:\/\/www.rfc-editor.org\/rfc\/rfc5905."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00009"},{"key":"e_1_3_2_1_25_1","volume-title":"Protocol State Fuzzing of TLS Implementations. In 24th USENIX Security Symposium (USENIX Security \u201915)","author":"de Ruiter Joeri","year":"2015","unstructured":"Joeri de Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In 24th USENIX Security Symposium (USENIX Security \u201915). USENIX Association, Washington, D.C., 193\u2013206. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/de-ruiter"},{"key":"e_1_3_2_1_26_1","volume-title":"Protocol State Fuzzing of TLS Implementations. In 24th USENIX Security Symposium (USENIX Security \u201915)","author":"de Ruiter Joeri","year":"2015","unstructured":"Joeri de Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In 24th USENIX Security Symposium (USENIX Security \u201915). USENIX Association, 193\u2013206. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/de-ruiter"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"R. Droms. 1997. Dynamic Host Configuration Protocol. https:\/\/www.rfc-editor.org\/rfc\/rfc2131\/.","DOI":"10.17487\/rfc2131"},{"key":"e_1_3_2_1_28_1","unstructured":"Mozilla E.\u00a0Rescorla. 2018. Network Time Protocol Version 4: Protocol and Algorithms Specification. https:\/\/www.rfc-editor.org\/rfc\/rfc8446."},{"key":"e_1_3_2_1_29_1","volume-title":"Analysis of DTLS Implementations Using Protocol State Fuzzing. In 29th USENIX Security Symposium (USENIX Security \u201920)","author":"Fiterau-Brostean Paul","year":"2020","unstructured":"Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, and Juraj Somorovsky. 2020. Analysis of DTLS Implementations Using Protocol State Fuzzing. In 29th USENIX Security Symposium (USENIX Security \u201920). USENIX Association, 2523\u20132540. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/fiterau-brostean"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"R.\u00a0Raszuk B. Decraene S.\u00a0Zhuang G.\u00a0Dawra K.\u00a0Talaulikar. 2022. BGP Overlay Services Based on Segment Routing over IPv6 (SRv6). https:\/\/www.rfc-editor.org\/rfc\/rfc9252.html.","DOI":"10.17487\/RFC9252"},{"key":"e_1_3_2_1_31_1","volume-title":"SCALE: Automatically Finding RFC Compliance Bugs in DNS Nameservers. In 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022","author":"Kesava\u00a0Reddy Kakarla Siva","year":"2022","unstructured":"Siva Kesava\u00a0Reddy Kakarla, Ryan Beckett, Todd\u00a0D. Millstein, and George Varghese. 2022. SCALE: Automatically Finding RFC Compliance Bugs in DNS Nameservers. In 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022, Amar Phanishayee and Vyas Sekar (Eds.). USENIX Association, 307\u2013323. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/kakarla"},{"volume-title":"Network and Distributed System Security Symposium(NDSS \u201921)","author":"Kim Eunsoo","key":"e_1_3_2_1_32_1","unstructured":"Eunsoo Kim, D. Kim, CheolJun Park, Insu Yun, and Y. Kim. 2021. BASESPEC: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. In Network and Distributed System Security Symposium(NDSS \u201921)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00030"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"J. Postel. 1997. Instructions to RFC Authors. https:\/\/www.rfc-editor.org\/rfc\/rfc2223.","DOI":"10.17487\/rfc2223"},{"key":"e_1_3_2_1_38_1","unstructured":"Van-Thuan\u00a0Pham Roberto\u00a0Natella. 2021. ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing. https:\/\/arxiv.org\/abs\/2101.05102"},{"key":"e_1_3_2_1_39_1","unstructured":"E. Rosen. 2017. Capabilities Advertisement with BGP-4. https:\/\/www.rfc-editor.org\/rfc\/rfc8277\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"R.\u00a0Droms S.\u00a0Alexander. 1997. DHCP Options and BOOTP Vendor Extensions. https:\/\/www.rfc-editor.org\/rfc\/rfc2131\/.","DOI":"10.17487\/rfc2132"},{"key":"e_1_3_2_1_41_1","unstructured":"A.\u00a0Lindem A. Sreekantiah H.\u00a0Gredler S.\u00a0Previdi C.\u00a0Filsfils. 2019. Segment Routing Prefix Segment Identifier Extensions for BGP. https:\/\/www.rfc-editor.org\/rfc\/rfc8669.html."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"J. Scudder. 2009. Capabilities Advertisement with BGP-4. https:\/\/www.rfc-editor.org\/rfc\/rfc5492\/.","DOI":"10.17487\/rfc5492"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00014"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.46"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.32"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"T.\u00a0Li Y.\u00a0Rekhter and S. Hares. 2006. A Border Gateway Protocol 4 (BGP-4). https:\/\/www.rfc-editor.org\/rfc\/rfc4271\/.","DOI":"10.17487\/rfc4271"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472910"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00016"},{"key":"e_1_3_2_1_50_1","volume-title":"TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021","author":"Zou Yong-Hao","year":"2021","unstructured":"Yong-Hao Zou, Jia-Ju Bai, Jielong Zhou, Jianfeng Tan, Chenggang Qin, and Shi-Min Hu. 2021. TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing. In 2021 USENIX Annual Technical Conference, USENIX ATC 2021, July 14-16, 2021, Irina Calciu and Geoff Kuenning (Eds.). USENIX Association, 489\u2013502. https:\/\/www.usenix.org\/conference\/atc21\/presentation\/zou"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:37:34Z","timestamp":1729075054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":50,"alternative-id":["10.1145\/3607199.3607222","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607222","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}