{"id":"https://openalex.org/W2077050569","doi":"https://doi.org/10.1109/icoin.2013.6496707","title":"A binary analysis method for protocol deviation discovery from implementations","display_name":"A binary analysis method for protocol deviation discovery from implementations","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2077050569","doi":"https://doi.org/10.1109/icoin.2013.6496707","mag":"2077050569"},"language":"en","primary_location":{"id":"doi:10.1109/icoin.2013.6496707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2013.6496707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Conference on Information Networking 2013 (ICOIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028490069","display_name":"Meijian Li","orcid":"https://orcid.org/0000-0003-0167-8932"},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meijian Li","raw_affiliation_strings":["Compute College, NUDT, ChangSha, China","Compute Coll. NUDT, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Compute College, NUDT, ChangSha, China","institution_ids":[]},{"raw_affiliation_string":"Compute Coll. NUDT, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424209","display_name":"Yongjun Wang","orcid":"https://orcid.org/0000-0002-3627-1465"},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjun Wang","raw_affiliation_strings":["Compute College, NUDT, ChangSha, China","Compute Coll. NUDT, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Compute College, NUDT, ChangSha, China","institution_ids":[]},{"raw_affiliation_string":"Compute Coll. NUDT, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111933401","display_name":"Peidai Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peidai Xie","raw_affiliation_strings":["Compute College, NUDT, ChangSha, China","Compute Coll. NUDT, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Compute College, NUDT, ChangSha, China","institution_ids":[]},{"raw_affiliation_string":"Compute Coll. NUDT, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028490069"],"corresponding_institution_ids":["https://openalex.org/I198357462"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.18204578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"5000","issue":null,"first_page":"670","last_page":"675"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.8253680467605591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8148893117904663},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6645679473876953},{"id":"https://openalex.org/keywords/two-phase-commit-protocol","display_name":"Two-phase commit protocol","score":0.5202659368515015},{"id":"https://openalex.org/keywords/tunneling-protocol","display_name":"Tunneling protocol","score":0.46531417965888977},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4220616817474365},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4161224663257599},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.38090041279792786},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37549713253974915},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3374011516571045},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20659562945365906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1890399158000946},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14204922318458557},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14202237129211426}],"concepts":[{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.8253680467605591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8148893117904663},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6645679473876953},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.5202659368515015},{"id":"https://openalex.org/C76885553","wikidata":"https://www.wikidata.org/wiki/Q957589","display_name":"Tunneling protocol","level":4,"score":0.46531417965888977},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4220616817474365},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4161224663257599},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.38090041279792786},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37549713253974915},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3374011516571045},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20659562945365906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1890399158000946},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14204922318458557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14202237129211426},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.0},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icoin.2013.6496707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2013.6496707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Conference on Information Networking 2013 (ICOIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W116656696","https://openalex.org/W207759855","https://openalex.org/W1577525693","https://openalex.org/W2016716561","https://openalex.org/W2098639318","https://openalex.org/W2117009500","https://openalex.org/W2119736157","https://openalex.org/W2138138395","https://openalex.org/W2141497545","https://openalex.org/W2153649445","https://openalex.org/W2157083801","https://openalex.org/W3008797115","https://openalex.org/W4231021522","https://openalex.org/W4251167975","https://openalex.org/W6608486618","https://openalex.org/W6634541221"],"related_works":["https://openalex.org/W4388857716","https://openalex.org/W2374988017","https://openalex.org/W3008319526","https://openalex.org/W2741684734","https://openalex.org/W4250093546","https://openalex.org/W1599215918","https://openalex.org/W2363852297","https://openalex.org/W2005183672","https://openalex.org/W2163429719","https://openalex.org/W1597757236"],"abstract_inverted_index":{"Generally":[0],"there":[1],"are":[2,20],"several":[3,51,159],"versions":[4],"of":[5,32,42,63,105,161,164,192],"implementations":[6,15,107,160],"for":[7,35,50,118],"a":[8,61,143],"network":[9],"protocol":[10,14,38,43,64,106,125,138,168],"specification.":[11,39],"However,":[12],"these":[13],"inevitably":[16],"contain":[17],"deviations,":[18],"which":[19],"usually":[21],"introduced":[22],"by":[23],"errors":[24],"in":[25,45,136,158],"engineering":[26],"development":[27],"process":[28],"or":[29],"different":[30,186],"interpretations":[31],"software":[33],"developers":[34],"the":[36,92,96,103,148,177,190,193],"same":[37],"Thus,":[40],"discovery":[41],"deviations":[44,75,135,157,183],"implementation":[46,126],"binaries":[47,104],"is":[48,131],"significant":[49],"applications,":[52],"such":[53],"as":[54],"exploiting":[55],"vulnerability":[56],"and":[57,82,151,169,188],"generating":[58],"fingerprint":[59],"from":[60],"series":[62],"implementations.":[65,139],"In":[66],"this":[67,153],"paper,":[68],"we":[69],"propose":[70],"an":[71],"approach":[72,94],"to":[73,114,133,146,155],"discover":[74,134,156,182],"based":[76],"on":[77,102],"dynamic":[78],"binary":[79],"analysis":[80],"technique":[81],"semantic-based":[83],"active":[84],"testing":[85],"technique.":[86],"Comparing":[87],"with":[88],"previous":[89],"similar":[90],"works,":[91],"proposed":[93,149,194],"has":[95],"following":[97],"advantages:":[98],"(1)":[99],"It":[100],"works":[101],"under":[108],"test,":[109],"thus":[110],"do":[111],"not":[112],"have":[113,141],"require":[115],"source":[116],"code":[117],"each":[119],"implementation;":[120],"(2)":[121],"By":[122],"observing":[123],"how":[124],"parses":[127],"encrypted":[128],"messages,":[129],"it":[130],"able":[132],"cryptographic":[137],"We":[140],"developed":[142],"prototype":[144,178],"system":[145,154,179],"evaluate":[147],"approach,":[150],"use":[152],"two":[162],"kinds":[163],"protocols:":[165],"text-based":[166],"HTTP":[167],"cryptography-based":[170],"FTPS":[171],"protocol.":[172],"The":[173],"results":[174],"show":[175],"that":[176],"can":[180],"successfully":[181],"between":[184],"their":[185],"implementations,":[187],"verifies":[189],"feasibility":[191],"approach.":[195]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
