{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:44:29Z","timestamp":1730328269260,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670871","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T16:35:50Z","timestamp":1721925350000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SoK: Automated Software Testing for TLS Libraries"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0003-0485-4791","authenticated-orcid":false,"given":"Ben","family":"Swierzy","sequence":"first","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8916-3209","authenticated-orcid":false,"given":"Felix","family":"Boes","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-3760-7976","authenticated-orcid":false,"given":"Timo","family":"Pohl","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-0576-8744","authenticated-orcid":false,"given":"Christian","family":"Bungartz","sequence":"additional","affiliation":[{"name":"University of Bonn, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-8199-5004","authenticated-orcid":false,"given":"Michael","family":"Meier","sequence":"additional","affiliation":[{"name":"University of Bonn, Fraunhofer FKIE, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_1_2_1","first-page":"176","article-title":"Software testing techniques for parallel systems: A survey","volume":"19","author":"Alghamdi M","year":"2019","unstructured":"Ahmed\u00a0M Alghamdi and Fathy\u00a0E Eassa. 2019. Software testing techniques for parallel systems: A survey. Int. J. Comput. Sci. Netw. Secur 19, 4 (2019), 176\u2013186.","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Software Foundation. 2021. CVE-2021-44228. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938260"},{"key":"e_1_3_2_1_5_1","volume-title":"The oracle problem in software testing: A survey","author":"Barr T","year":"2014","unstructured":"Earl\u00a0T Barr, Mark Harman, Phil McMinn, Muzammil Shahbaz, and Shin Yoo. 2014. The oracle problem in software testing: A survey. IEEE transactions on software engineering 41, 5 (2014), 507\u2013525."},{"key":"e_1_3_2_1_6_1","volume-title":"FLEXTLS: A Tool for Testing TLS Implementations. In 9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Beurdouche Benjamin","year":"2015","unstructured":"Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, and Karthikeyan Bhargavan. 2015. FLEXTLS: A Tool for Testing TLS Implementations. In 9th USENIX Workshop on Offensive Technologies (WOOT 15)."},{"key":"e_1_3_2_1_7_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"B\u00f6ck Hanno","year":"2018","unstructured":"Hanno B\u00f6ck, Juraj Somorovsky, and Craig Young. 2018. Return Of Bleichenbacher\u2019s Oracle Threat (ROBOT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 817\u2013849. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bock"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Sharon Boeyen Stefan Santesson Tim Polk Russ Housley Stephen Farrell and David Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.63"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Scott\u00a0O. Bradner. 1997. Key words for use in RFCs to Indicate Requirement Levels. RFC 2119. https:\/\/doi.org\/10.17487\/RFC2119","DOI":"10.17487\/RFC2119"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110542"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"e_1_3_2_1_13_1","unstructured":"BSI. 2023. TaSK Framework. https:\/\/github.com\/BSI-Bund\/TaSK"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.40"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3363562","article-title":"A survey of compiler testing","volume":"53","author":"Chen Junjie","year":"2020","unstructured":"Junjie Chen, Jibesh Patra, Michael Pradel, Yingfei Xiong, Hongyu Zhang, Dan Hao, and Lu Zhang. 2020. A survey of compiler testing. ACM Computing Surveys (CSUR) 53, 1 (2020), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_1_20_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"De\u00a0Ruiter Joeri","year":"2015","unstructured":"Joeri De\u00a0Ruiter and Erik Poll. 2015. Protocol state fuzzing of TLS implementations. In 24th USENIX Security Symposium (USENIX Security 15). 193\u2013206."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2892517"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400261"},{"key":"e_1_3_2_1_24_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Kaloper-Mer\u0161injak David","year":"2015","unstructured":"David Kaloper-Mer\u0161injak, Hannes Mehnert, Anil Madhavapeddy, and Peter Sewell. 2015. Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 223\u2013238. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/kaloper-mersinjak"},{"key":"e_1_3_2_1_25_1","unstructured":"Hubert Kario. 2015. tlsfuzzer. https:\/\/github.com\/tlsfuzzer\/tlsfuzzer"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_27_1","volume-title":"Guidelines for performing Systematic Literature Reviews in Software Engineering. 2 (01","author":"Kitchenham Barbara","year":"2007","unstructured":"Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering. 2 (01 2007)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.14"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00132-7"},{"key":"e_1_3_2_1_31_1","volume-title":"TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Maehren Marcel","year":"2022","unstructured":"Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, and J\u00f6rg Schwenk. 2022. TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. In 31st USENIX Security Symposium (USENIX Security 22). 215\u2013232."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337209"},{"key":"e_1_3_2_1_35_1","first-page":"34","article-title":"This POODLE bites: exploiting the SSL 3.0 fallback","volume":"21","author":"M\u00f6ller Bodo","year":"2014","unstructured":"Bodo M\u00f6ller, Thai Duong, and Krzysztof Kotowicz. 2014. This POODLE bites: exploiting the SSL 3.0 fallback. Security Advisory 21 (2014), 34\u201358.","journal-title":"Security Advisory"},{"key":"e_1_3_2_1_36_1","unstructured":"NIST. 2022. Combinatorial Testing. https:\/\/www.nist.gov\/programs-projects\/combinatorial-testing"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0262176"},{"volume-title":"Advances in Computers. Vol.\u00a0112","author":"Papadakis Mike","key":"e_1_3_2_1_38_1","unstructured":"Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le\u00a0Traon, and Mark Harman. 2019. Mutation testing advances: an analysis and survey. In Advances in Computers. Vol.\u00a0112. Elsevier, 275\u2013378."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.27"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416552"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2012.6228988"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993288.2993302"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349325"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00084"},{"key":"e_1_3_2_1_46_1","volume-title":"Testing TLS using planning-based combinatorial methods and execution framework. Software quality journal 27","author":"Simos E","year":"2019","unstructured":"Dimitris\u00a0E Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, and Franz Wotawa. 2019. Testing TLS using planning-based combinatorial methods and execution framework. Software quality journal 27 (2019), 703\u2013729."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.46"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355048"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9409-1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2763947"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585565"},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. Oakland","author":"Wu Qiushi","year":"2021","unstructured":"Qiushi Wu and Kangjie Lu. 2021. On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits. Proc. Oakland (2021)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2962027"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00032"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T01:27:37Z","timestamp":1729128457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":55,"alternative-id":["10.1145\/3664476.3670871","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670871","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}