{"id":"https://openalex.org/W4387321771","doi":"https://doi.org/10.1145/3607199.3607222","title":"EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations","display_name":"EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321771","doi":"https://doi.org/10.1145/3607199.3607222"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607222","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607222","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607222","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084983082","display_name":"Jingting Chen","orcid":"https://orcid.org/0000-0001-9806-9054"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingting Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103042672","display_name":"Feng Li","orcid":"https://orcid.org/0009-0008-2126-663X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103179736","display_name":"Qingfang Chen","orcid":"https://orcid.org/0009-0002-7230-5076"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingfang Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084789538","display_name":"P. Li","orcid":"https://orcid.org/0009-0004-8974-1565"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security,University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101490597","display_name":"Lili Xu","orcid":"https://orcid.org/0009-0007-2547-8376"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050683592","display_name":"Wei Huo","orcid":"https://orcid.org/0009-0000-7121-1196"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Huo","raw_affiliation_strings":["Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China","School of CyberSpace Security at University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"School of CyberSpace Security at University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"412","last_page":"425"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.72058606},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5388152},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.43634924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81416893},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.72058606},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.66331524},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5388152},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.49451682},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.43634924},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2657746},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09737629},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607222","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607222","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607222","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607222","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1744779065","https://openalex.org/W2126166995","https://openalex.org/W2150874999","https://openalex.org/W2532335977","https://openalex.org/W2615918556","https://openalex.org/W2672575173","https://openalex.org/W2795354477","https://openalex.org/W2868435436","https://openalex.org/W2950911860","https://openalex.org/W3047947484","https://openalex.org/W3096566855","https://openalex.org/W3192907204","https://openalex.org/W4285736135","https://openalex.org/W4286331376","https://openalex.org/W4287849789","https://openalex.org/W4299418846","https://openalex.org/W4300480330","https://openalex.org/W4300490703","https://openalex.org/W4302314722"],"related_works":["https://openalex.org/W797688974","https://openalex.org/W4238532390","https://openalex.org/W2977179488","https://openalex.org/W2961779879","https://openalex.org/W2209382646","https://openalex.org/W2188872161","https://openalex.org/W2144453115","https://openalex.org/W2128223750","https://openalex.org/W2120447654","https://openalex.org/W2002978035"],"abstract_inverted_index":{"The":[0],"implementation":[1],"of":[2,23,35,106],"network":[3],"protocol":[4,98],"must":[5],"comply":[6],"with":[7],"respective":[8],"Request":[9],"for":[10],"Comments":[11],"(RFC)":[12],"and":[13,25,86],"updated":[14],"as":[15,69],"RFCs":[16,24],"evolve.":[17],"However,":[18,100],"due":[19],"to":[20,49,57,63,82,93],"the":[21,26,33,104],"richness":[22],"complex":[27],"relationships":[28],"between":[29],"them,":[30],"systematically":[31],"discovering":[32],"evolution":[34,105],"RFC":[36,52,66,84,107],"requirements":[37,108],"is":[38],"non-trivial,":[39],"which":[40],"consequently":[41],"brings":[42],"in":[43,97],"inconsistency":[44,58,95],"bugs":[45,59,71,96],"when":[46,60],"modifying":[47,61],"code":[48,62],"support":[50,64],"new":[51,65],"documents.":[53],"This":[54],"can":[55],"lead":[56],"documents,":[67],"known":[68],"RFC-evolutionary":[70],"or":[72,90],"ebugs.":[73],"Recent":[74],"approaches":[75],"have":[76],"used":[77],"natural":[78],"language":[79],"processing":[80],"techniques":[81],"extract":[83],"rules":[85],"employed":[87],"differential":[88],"testing":[89],"static":[91],"analysis":[92],"discover":[94],"implementations.":[99],"they":[101],"seldom":[102],"consider":[103],"nor":[109],"their":[110],"related":[111],"bugs.":[112]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387321771","counts_by_year":[],"updated_date":"2025-02-19T15:52:51.060730","created_date":"2023-10-04"}