{"id":"https://openalex.org/W1608615004","doi":"https://doi.org/10.1109/tr.2015.2443392","title":"Enhancing Conformance Testing Using Symbolic Execution for Network Protocols","display_name":"Enhancing Conformance Testing Using Symbolic Execution for Network Protocols","publication_year":2015,"publication_date":"2015-06-18","ids":{"openalex":"https://openalex.org/W1608615004","doi":"https://doi.org/10.1109/tr.2015.2443392","mag":"1608615004"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2015.2443392","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073827174","display_name":"JaeSeung Song","orcid":"https://orcid.org/0000-0002-2157-9651"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"funder","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"JaeSeung Song","raw_affiliation_strings":["Department of Computer and Information Security, Sejong University, Seoul"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Security, Sejong University, Seoul","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016563574","display_name":"Hyoungshick Kim","orcid":"https://orcid.org/0000-0002-1605-3866"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"funder","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyoungshick Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Sungkyunkwan University, Suwon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100447408","display_name":"Soojin Park","orcid":"https://orcid.org/0000-0002-5935-9523"},"institutions":[{"id":"https://openalex.org/I148751991","display_name":"Sogang University","ror":"https://ror.org/056tn4839","country_code":"KR","type":"funder","lineage":["https://openalex.org/I148751991"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soojin Park","raw_affiliation_strings":["Graduate School of MOT, Sogang University, Seoul"],"affiliations":[{"raw_affiliation_string":"Graduate School of MOT, Sogang University, Seoul","institution_ids":["https://openalex.org/I148751991"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.291,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.81746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"64","issue":"3","first_page":"1024","last_page":"1037"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/conformance-testing","display_name":"Conformance testing","score":0.7816962},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.726291},{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.6673893},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.44676742}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85114074},{"id":"https://openalex.org/C76844732","wikidata":"https://www.wikidata.org/wiki/Q4072285","display_name":"Conformance testing","level":3,"score":0.7816962},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.726291},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.70150983},{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.6673893},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.55241144},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5237115},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.45224488},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.44676742},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.35774302},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3440286},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3330828},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31093544},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29705757},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29151577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20251358},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14885223},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.14491236},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12266928},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2015.2443392","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.77,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":44,"referenced_works":["https://openalex.org/W116894366","https://openalex.org/W1484700963","https://openalex.org/W1694077306","https://openalex.org/W1710734607","https://openalex.org/W1981480808","https://openalex.org/W2006841241","https://openalex.org/W2008813808","https://openalex.org/W2009007001","https://openalex.org/W2009489720","https://openalex.org/W2018041465","https://openalex.org/W2027422213","https://openalex.org/W2028280229","https://openalex.org/W2032153666","https://openalex.org/W2042033151","https://openalex.org/W2062200967","https://openalex.org/W2071112258","https://openalex.org/W2082172430","https://openalex.org/W2096449544","https://openalex.org/W2096659083","https://openalex.org/W2097576663","https://openalex.org/W2098115125","https://openalex.org/W2098681203","https://openalex.org/W2106539366","https://openalex.org/W2109178099","https://openalex.org/W2114856590","https://openalex.org/W2123023940","https://openalex.org/W2124657291","https://openalex.org/W2132897303","https://openalex.org/W2138788987","https://openalex.org/W2138890930","https://openalex.org/W2141498181","https://openalex.org/W2146973388","https://openalex.org/W2152200777","https://openalex.org/W2152417223","https://openalex.org/W2153185479","https://openalex.org/W2155346278","https://openalex.org/W2159849744","https://openalex.org/W2165015106","https://openalex.org/W3090199681","https://openalex.org/W3160978791","https://openalex.org/W335711039","https://openalex.org/W4232821456","https://openalex.org/W4234542549","https://openalex.org/W4246166885"],"related_works":["https://openalex.org/W2378154521","https://openalex.org/W2376131832","https://openalex.org/W2350218691","https://openalex.org/W2318524837","https://openalex.org/W2187841777","https://openalex.org/W2166362993","https://openalex.org/W2127062809","https://openalex.org/W2061183036","https://openalex.org/W2009637593","https://openalex.org/W1768417109"],"abstract_inverted_index":{"Security":[0],"protocols":[1],"are":[2,20,24],"notoriously":[3],"difficult":[4],"to":[5,22,121],"get":[6],"right,":[7],"and":[8,30,55,69,97,144,150],"most":[9],"go":[10],"through":[11],"several":[12],"iterations":[13],"before":[14],"their":[15],"hidden":[16],"security":[17,153],"vulnerabilities,":[18],"which":[19],"hard":[21],"detect,":[23],"triggered.":[25],"To":[26],"help":[27],"protocol":[28,91,143],"designers":[29],"developers":[31],"efficiently":[32],"find":[33],"non-trivial":[34,152],"bugs,":[35],"we":[36],"introduce":[37],"SYMCONF,":[38],"a":[39,51,89,107,125],"practical":[40],"conformance":[41,52,67,81,108],"testing":[42,68],"tool":[43],"that":[44],"generates":[45,101],"high-coverage":[46,102],"test":[47,53,82,103,109,130],"input":[48,104,131],"packets":[49,105,132],"using":[50,106],"suite":[54],"symbolic":[56,70,76,95],"execution.":[57],"Our":[58],"approach":[59],"can":[60],"be":[61],"viewed":[62],"as":[63],"the":[64,94,113,122,140,156],"combination":[65],"of":[66,115,124,127,136],"execution:":[71],"1)":[72],"it":[73,85,99],"first":[74],"selects":[75],"inputs":[77],"from":[78],"an":[79],"existing":[80],"suite;":[83],"2)":[84],"then":[86],"symbolically":[87],"executes":[88],"network":[90,138],"implementation":[92],"with":[93],"inputs;":[96],"3)":[98],"finally":[100],"suite.":[110],"We":[111],"demonstrate":[112],"feasibility":[114],"this":[116],"methodology":[117],"by":[118],"applying":[119],"SYMCONF":[120],"generation":[123],"stream":[126],"high":[128],"quality":[129],"for":[133],"multiple":[134],"implementations":[135],"two":[137],"protocols,":[139],"Kerberos":[141],"Telnet":[142],"Dynamic":[145],"Host":[146],"Configuration":[147],"Protocol":[148],"(DHCP),":[149],"discovering":[151],"bugs":[154],"in":[155],"protocols.":[157]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1608615004","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-03-18T10:20:21.822342","created_date":"2016-06-24"}