{"id":"https://openalex.org/W4414170677","doi":"https://doi.org/10.1109/iwqos65803.2025.11143461","title":"Unleashing the Power of LLM to Infer State Machine From the Protocol Implementation","display_name":"Unleashing the Power of LLM to Infer State Machine From the Protocol Implementation","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4414170677","doi":"https://doi.org/10.1109/iwqos65803.2025.11143461"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos65803.2025.11143461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009693444","display_name":"Haiyang Wei","orcid":"https://orcid.org/0000-0002-0145-9353"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyang Wei","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036356449","display_name":"Ligeng Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ligeng Chen","raw_affiliation_strings":["Honor Device Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Honor Device Co., Ltd","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007997313","display_name":"Zhengjie Du","orcid":"https://orcid.org/0009-0002-7032-2681"},"institutions":[{"id":"https://openalex.org/I4210153393","display_name":"Geely (China)","ror":"https://ror.org/0446d5v35","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210153393"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengjie Du","raw_affiliation_strings":["Geely Automobile Research Institute"],"affiliations":[{"raw_affiliation_string":"Geely Automobile Research Institute","institution_ids":["https://openalex.org/I4210153393"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016199365","display_name":"Yizheng Wu","orcid":"https://orcid.org/0000-0002-9289-1271"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhan Wu","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111080879","display_name":"Haohui Huang","orcid":"https://orcid.org/0009-0005-8957-4469"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haohui Huang","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008320764","display_name":"Yue Liu","orcid":"https://orcid.org/0000-0001-8518-5734"},"institutions":[{"id":"https://openalex.org/I4210119527","display_name":"Qi2","ror":"https://ror.org/021wvan87","country_code":"US","type":"company","lineage":["https://openalex.org/I4210119527"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yue Liu","raw_affiliation_strings":["QI-ANXIN Group"],"affiliations":[{"raw_affiliation_string":"QI-ANXIN Group","institution_ids":["https://openalex.org/I4210119527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University","institution_ids":["https://openalex.org/I4210090971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114549816","display_name":"Fengyuan Xu","orcid":"https://orcid.org/0000-0003-3388-7544"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyuan Xu","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090305216","display_name":"Linzhang Wang","orcid":"https://orcid.org/0000-0003-4794-1652"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linzhang Wang","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032564674","display_name":"Bing Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Mao","raw_affiliation_strings":["Nanjing University,The State Key Laboratory for Novel Software Technology"],"affiliations":[{"raw_affiliation_string":"Nanjing University,The State Key Laboratory for Novel Software Technology","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5009693444"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13364688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12072","display_name":"Machine Learning and Algorithms","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12072","display_name":"Machine Learning and Algorithms","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7430999875068665},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.6833999752998352},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.6237000226974487},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.6139000058174133},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5974000096321106},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5604000091552734},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46059998869895935},{"id":"https://openalex.org/keywords/protocol-analysis","display_name":"Protocol analysis","score":0.43720000982284546},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.43619999289512634},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.3806999921798706}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8251000046730042},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7430999875068665},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.6833999752998352},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.6237000226974487},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.6139000058174133},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5974000096321106},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5604000091552734},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46059998869895935},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.43720000982284546},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.43619999289512634},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.41130000352859497},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40139999985694885},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.3806999921798706},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.36959999799728394},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.36719998717308044},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3127000033855438},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3086000084877014},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.29420000314712524},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.28529998660087585},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.28439998626708984},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C71065454","wikidata":"https://www.wikidata.org/wiki/Q721869","display_name":"Reverse Address Resolution Protocol","level":4,"score":0.2709999978542328},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2644999921321869},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2621000111103058},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2597000002861023},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos65803.2025.11143461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos65803.2025.11143461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2018506753","https://openalex.org/W2618267215","https://openalex.org/W2889163348","https://openalex.org/W2914304175","https://openalex.org/W2990138404","https://openalex.org/W3004758087","https://openalex.org/W3047947484","https://openalex.org/W3101498506","https://openalex.org/W3138456218","https://openalex.org/W4242156770","https://openalex.org/W4288057700","https://openalex.org/W4320560161","https://openalex.org/W4375959372","https://openalex.org/W4384345708","https://openalex.org/W4391579642","https://openalex.org/W4391724785","https://openalex.org/W4394745858","https://openalex.org/W4394769544"],"related_works":[],"abstract_inverted_index":{"State":[0],"machines":[1,14],"are":[2],"essential":[3],"for":[4],"enhancing":[5],"protocol":[6,17,83,116,122,148],"analysis":[7,30,43],"to":[8,22,38,74,163],"identify":[9,91],"vulnerabilities.":[10],"However,":[11],"inferring":[12],"state":[13,35,56,94,107],"from":[15,82],"network":[16],"implementations":[18,123],"is":[19],"challenging":[20],"due":[21,37],"complex":[23],"code":[24,114],"syntax":[25],"and":[26,92,157],"semantics.":[27],"Traditional":[28],"dynamic":[29],"methods":[31],"often":[32],"miss":[33],"critical":[34],"transitions":[36],"limited":[39],"coverage,":[40],"while":[41],"static":[42],"faces":[44],"path":[45],"explosion":[46],"issues.":[47],"To":[48,96],"overcome":[49],"these":[50],"challenges,":[51],"we":[52,89],"introduce":[53],"a":[54,76,129],"novel":[55],"machine":[57,108],"inference":[58,109],"approach":[59,103,146],"utilizing":[60],"Large":[61],"Language":[62],"Models":[63],"(LLMs),":[64],"named":[65],"ProtocolGPT.":[66],"This":[67],"method":[68,127],"employs":[69],"retrieval":[70],"augmented":[71],"generation":[72],"technology":[73],"enhance":[75],"pre-trained":[77],"model":[78],"with":[79,147],"specific":[80],"knowledge":[81],"implementations.":[84,117],"Through":[85],"effective":[86],"prompt":[87],"engineering,":[88],"accurately":[90],"infer":[93],"machines.":[95],"the":[97,105,112,136],"best":[98],"of":[99,115,120,131],"our":[100,102,126,145],"knowledge,":[101],"represents":[104],"first":[106],"that":[110,125],"leverages":[111],"source":[113],"Our":[118],"evaluation":[119],"six":[121],"shows":[124],"achieves":[128],"precision":[130],"over":[132],"90":[133],"%,":[134],"outperforming":[135],"baselines":[137],"by":[138,152],"more":[139,153],"than":[140,154],"30":[141],"%.":[142],"Furthermore,":[143],"integrating":[144],"fuzzing":[149],"improves":[150],"coverage":[151],"20":[155],"%":[156],"uncovers":[158],"two":[159],"0-day":[160],"vulnerabilities":[161],"compared":[162],"baseline":[164],"methods.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
