{"id":"https://openalex.org/W4287884186","doi":"https://doi.org/10.1109/spw54247.2022.9833866","title":"A Secure Parser Generation Framework for IoT Protocols on Microcontrollers","display_name":"A Secure Parser Generation Framework for IoT Protocols on Microcontrollers","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4287884186","doi":"https://doi.org/10.1109/spw54247.2022.9833866"},"language":"en","primary_location":{"id":"doi:10.1109/spw54247.2022.9833866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031345285","display_name":"Sameed Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sameed Ali","raw_affiliation_strings":["Dartmouth College,Hanover","Dartmouth College, Hanover"],"affiliations":[{"raw_affiliation_string":"Dartmouth College,Hanover","institution_ids":["https://openalex.org/I107672454"]},{"raw_affiliation_string":"Dartmouth College, Hanover","institution_ids":["https://openalex.org/I107672454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102885109","display_name":"Sean W. Smith","orcid":"https://orcid.org/0000-0001-5995-574X"},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sean Smith","raw_affiliation_strings":["Dartmouth College,Hanover","Dartmouth College, Hanover"],"affiliations":[{"raw_affiliation_string":"Dartmouth College,Hanover","institution_ids":["https://openalex.org/I107672454"]},{"raw_affiliation_string":"Dartmouth College, Hanover","institution_ids":["https://openalex.org/I107672454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031345285"],"corresponding_institution_ids":["https://openalex.org/I107672454"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07324078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"124","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8613663911819458},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.6590229272842407},{"id":"https://openalex.org/keywords/lr-parser","display_name":"LR parser","score":0.5439545512199402},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.5146978497505188},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5145732760429382},{"id":"https://openalex.org/keywords/regular-expression","display_name":"Regular expression","score":0.4886088967323303},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4603085517883301},{"id":"https://openalex.org/keywords/rule-based-machine-translation","display_name":"Rule-based machine translation","score":0.4601297080516815},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4476821720600128},{"id":"https://openalex.org/keywords/parser-combinator","display_name":"Parser combinator","score":0.35727229714393616},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33823293447494507},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2504509687423706},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13679128885269165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8613663911819458},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.6590229272842407},{"id":"https://openalex.org/C35164859","wikidata":"https://www.wikidata.org/wiki/Q1756442","display_name":"LR parser","level":4,"score":0.5439545512199402},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.5146978497505188},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5145732760429382},{"id":"https://openalex.org/C121329065","wikidata":"https://www.wikidata.org/wiki/Q185612","display_name":"Regular expression","level":2,"score":0.4886088967323303},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4603085517883301},{"id":"https://openalex.org/C53893814","wikidata":"https://www.wikidata.org/wiki/Q7378909","display_name":"Rule-based machine translation","level":2,"score":0.4601297080516815},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4476821720600128},{"id":"https://openalex.org/C118364021","wikidata":"https://www.wikidata.org/wiki/Q7139956","display_name":"Parser combinator","level":3,"score":0.35727229714393616},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33823293447494507},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2504509687423706},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13679128885269165},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spw54247.2022.9833866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spw54247.2022.9833866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Security and Privacy Workshops (SPW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.4399999976158142,"display_name":"Quality Education"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1454728789","https://openalex.org/W1490215723","https://openalex.org/W1508641834","https://openalex.org/W1509784638","https://openalex.org/W1534850143","https://openalex.org/W1689185560","https://openalex.org/W1943070836","https://openalex.org/W1993255342","https://openalex.org/W1994926493","https://openalex.org/W2070310827","https://openalex.org/W2267469130","https://openalex.org/W2776161072","https://openalex.org/W2949034369","https://openalex.org/W2978834141","https://openalex.org/W2998768639","https://openalex.org/W3105233674","https://openalex.org/W3173889114","https://openalex.org/W6628624784","https://openalex.org/W6763411181","https://openalex.org/W6768703426"],"related_works":["https://openalex.org/W2146605784","https://openalex.org/W2052442681","https://openalex.org/W2552348786","https://openalex.org/W2024425679","https://openalex.org/W2019566789","https://openalex.org/W2075637111","https://openalex.org/W4237774781","https://openalex.org/W2098396599","https://openalex.org/W2246820938","https://openalex.org/W1971174339"],"abstract_inverted_index":{"In":[0,97],"the":[1,7,63,113,122,136,187,201,213,244,249,252,256],"recent":[2,257],"years,":[3],"vulnerabilities":[4],"found":[5,84,92,247],"in":[6,79,85,93,103,248,255],"packet":[8,26,32],"parsers":[9,27,74,144,182,199],"of":[10,36,38,124,138,163,189,251],"Bluetooth":[11],"Low":[12],"Energy":[13],"(BLE)":[14],"protocol":[15,25,33,203],"have":[16,22,193],"called":[17,169],"for":[18,28,128,183,200,233,243],"a":[19,133,155,172,240],"need":[20],"to":[21,44,60,81,135,142,179,197,219,231],"secure":[23,148,157],"lightweight":[24,181,217],"microcontrollers.":[29],"Since":[30],"these":[31,130],"grammars":[34,64,87],"consist":[35],"packets":[37],"limited":[39,226],"size":[40],"it":[41],"is":[42,75,106,132],"possible":[43],"parse":[45],"them":[46],"efficiently":[47],"via":[48,55,65],"Finite":[49],"State":[50],"Machines":[51],"(FSM).":[52],"However,":[53],"parsing":[54],"FSMs":[56,215],"would":[57],"require":[58],"developers":[59],"either":[61],"express":[62],"regular":[66,95,104],"expressions":[67,115],"or":[68],"constructed":[69],"hand-coded":[70],"parsers.":[71],"Unfortunately,":[72],"hand-coding":[73],"error-prone;":[76],"furthermore,":[77],"due":[78],"part":[80],"certain":[82],"constructs":[83,102,131],"such":[86],"which":[88,145,161],"are":[89,116,146,216,229],"not":[90,107],"commonly":[91],"text-based":[94],"grammars.":[96],"addition,":[98],"expressing":[99],"binary":[100],"grammar":[101],"expression":[105],"only":[108],"challenging":[109],"and":[110,119,149,171,228],"error-prone":[111],"but":[112],"resulting":[114],"often":[117],"complex":[118],"unreadable.":[120],"Thus":[121],"lack":[123],"an":[125,164,206],"alternative":[126],"language":[127,168],"describing":[129],"hindrance":[134],"use":[137,232],"finite":[139,176],"state":[140,177],"machines":[141,178],"generate":[143,180,198],"safe,":[147],"computationally":[150],"bounded.":[151],"This":[152],"paper":[153],"presents":[154],"novel":[156],"parser":[158,166],"generation":[159],"framework":[160,196],"consists":[162],"easy-to-use":[165],"description":[167],"\"Microparse\"":[170],"toolkit":[173],"that":[174,212],"utilizes":[175],"micro-controllers.":[184],"To":[185],"demonstrate":[186,211],"viability":[188],"this":[190,237],"approach,":[191],"we":[192,235],"applied":[194],"our":[195],"BLE":[202,253],"running":[204],"on":[205,222],"Ubertooth":[207],"One":[208],"Microcontroller.":[209],"We":[210],"generated":[214],"enough":[218],"be":[220],"run":[221],"devices":[223],"with":[224],"very":[225],"resources,":[227],"easier":[230],"developers;":[234],"offer":[236],"method":[238],"as":[239],"potential":[241],"solution":[242],"various":[245],"bugs":[246],"implementation":[250],"firmware":[254],"years.":[258]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
