{"id":"https://openalex.org/W2138890930","doi":"https://doi.org/10.1109/icccn.2011.6005945","title":"Rule-Based Verification of Network Protocol Implementations Using Symbolic Execution","display_name":"Rule-Based Verification of Network Protocol Implementations Using Symbolic Execution","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2138890930","doi":"https://doi.org/10.1109/icccn.2011.6005945","mag":"2138890930"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2011.6005945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2011.6005945","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073827174","display_name":"JaeSeung Song","orcid":"https://orcid.org/0000-0002-2157-9651"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"JaeSeung Song","raw_affiliation_strings":["Department of Computing, Imperial College London, London, UK","Dept. of Comput., Imperial Coll. London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Dept. of Comput., Imperial Coll. London, London, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069370346","display_name":"Tiejun Ma","orcid":"https://orcid.org/0000-0001-5545-6978"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tiejun Ma","raw_affiliation_strings":["Department of Computing, Imperial College London, London, UK","Dept. of Comput., Imperial Coll. London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Dept. of Comput., Imperial Coll. London, London, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053355200","display_name":"Cristian Cadar","orcid":"https://orcid.org/0000-0002-3599-7264"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Cristian Cadar","raw_affiliation_strings":["Department of Computing, Imperial College London, London, UK","Dept. of Comput., Imperial Coll. London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Dept. of Comput., Imperial Coll. London, London, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078842469","display_name":"Peter Pietzuch","orcid":"https://orcid.org/0000-0002-6963-5640"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peter Pietzuch","raw_affiliation_strings":["Department of Computing, Imperial College London, London, UK","Dept. of Comput., Imperial Coll. London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Dept. of Comput., Imperial Coll. London, London, UK","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073827174"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":2.4287,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.89459963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8313359618186951},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.684481143951416},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6573902368545532},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6269614100456238},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5186452269554138},{"id":"https://openalex.org/keywords/concolic-testing","display_name":"Concolic testing","score":0.4794287085533142},{"id":"https://openalex.org/keywords/symbolic-trajectory-evaluation","display_name":"Symbolic trajectory evaluation","score":0.4415784776210785},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.436912477016449},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.36443203687667847},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.3346860706806183},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08834096789360046}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8313359618186951},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.684481143951416},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6573902368545532},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6269614100456238},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5186452269554138},{"id":"https://openalex.org/C11219265","wikidata":"https://www.wikidata.org/wiki/Q5158734","display_name":"Concolic testing","level":4,"score":0.4794287085533142},{"id":"https://openalex.org/C23123167","wikidata":"https://www.wikidata.org/wiki/Q7661193","display_name":"Symbolic trajectory evaluation","level":3,"score":0.4415784776210785},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.436912477016449},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.36443203687667847},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.3346860706806183},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08834096789360046},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icccn.2011.6005945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2011.6005945","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.221.6693","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.6693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://lsds.doc.ic.ac.uk/research/doc/icccn11-symnv.pdf","raw_type":"text"},{"id":"pmh:oai:eprints.soton.ac.uk:204603","is_oa":false,"landing_page_url":"https://eprints.soton.ac.uk/204603/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W157156687","https://openalex.org/W1511806592","https://openalex.org/W1514171102","https://openalex.org/W1520102093","https://openalex.org/W1674877186","https://openalex.org/W1710734607","https://openalex.org/W1744779065","https://openalex.org/W1877496576","https://openalex.org/W1968086891","https://openalex.org/W1996185014","https://openalex.org/W2001280955","https://openalex.org/W2015103810","https://openalex.org/W2019125550","https://openalex.org/W2019194097","https://openalex.org/W2036017480","https://openalex.org/W2101512909","https://openalex.org/W2110908283","https://openalex.org/W2117784070","https://openalex.org/W2123886726","https://openalex.org/W2132897303","https://openalex.org/W2153185479","https://openalex.org/W2153339829","https://openalex.org/W2261363090","https://openalex.org/W3022140103","https://openalex.org/W4246166885","https://openalex.org/W6606430823","https://openalex.org/W6630768022","https://openalex.org/W6637096788","https://openalex.org/W6637688222","https://openalex.org/W6637954365","https://openalex.org/W6655285251"],"related_works":["https://openalex.org/W2047694629","https://openalex.org/W2159173410","https://openalex.org/W1959575449","https://openalex.org/W2091409764","https://openalex.org/W1592393183","https://openalex.org/W184413546","https://openalex.org/W2565568938","https://openalex.org/W42122073","https://openalex.org/W3162855084","https://openalex.org/W2145463549"],"abstract_inverted_index":{"The":[0,56],"secure":[1],"and":[2,13,18,28,89,120,130,145],"correct":[3],"implementation":[4,26],"of":[5,48,58,76,86,93,125,141],"network":[6,14,32,67,112],"protocols":[7],"for":[8],"resource":[9],"discovery,":[10],"device":[11],"configuration":[12],"management":[15],"is":[16,61,71,149],"complex":[17,46],"error-prone.":[19],"Protocol":[20],"specifications":[21],"contain":[22],"ambiguities,":[23],"leading":[24],"to":[25,38,62,72,114,137,151],"flaws":[27],"security":[29],"vulnerabilities":[30],"in":[31,66,81],"daemons.":[33,68],"Such":[34],"problems":[35],"are":[36,42],"hard":[37],"detect":[39],"because":[40],"they":[41],"often":[43],"triggered":[44],"by":[45],"sequences":[47],"packets":[49,78,119],"that":[50,79,107,147],"occur":[51],"only":[52],"after":[53],"prolonged":[54],"operation.":[55],"goal":[57],"this":[59],"work":[60],"find":[63],"semantic":[64],"bugs":[65],"Our":[69],"approach":[70],"replay":[73],"a":[74,103,111,123],"set":[75,124],"input":[77,118,129],"result":[80],"high":[82,116],"source":[83],"code":[84],"coverage":[85,117],"the":[87,97,142],"daemon":[88,113],"observe":[90],"potential":[91],"violations":[92],"rules":[94,126],"derived":[95],"from":[96],"protocol":[98,144],"specification.":[99],"We":[100,133],"describe":[101],"SYMNV,":[102],"practical":[104],"verification":[105],"tool":[106],"first":[108],"symbolically":[109],"executes":[110],"generate":[115],"then":[121],"checks":[122],"constraining":[127],"permitted":[128],"output":[131],"packets.":[132],"have":[134],"applied":[135],"SYMNV":[136],"three":[138],"different":[139],"implementations":[140],"Zeroconf":[143],"show":[146],"it":[148],"able":[150],"discover":[152],"non-trivial":[153],"bugs.":[154]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
