{"id":"https://openalex.org/W4311165737","doi":"https://doi.org/10.1145/3564625.3564650","title":"StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance","display_name":"StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4311165737","doi":"https://doi.org/10.1145/3564625.3564650"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3564650","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564650","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023766341","display_name":"Zhechang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhechang Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076311357","display_name":"Bin Yuan","orcid":"https://orcid.org/0000-0002-5365-904X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yuan","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, China and Shenzhen Huazhong University of Science and Technology Research Institute, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China and Shenzhen Huazhong University of Science and Technology Research Institute, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006398666","display_name":"Kehan Yang","orcid":"https://orcid.org/0000-0001-9302-8878"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kehan Yang","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["School of Computer Science and Technology, Huazhong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Huazhong University of Science and Technology, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023766341"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.7097,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72490362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"756","last_page":"768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.6746873259544373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.569166898727417},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4901033341884613},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4556697607040405},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.41829124093055725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21368932723999023},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18409472703933716},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11175298690795898}],"concepts":[{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.6746873259544373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.569166898727417},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4901033341884613},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4556697607040405},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.41829124093055725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21368932723999023},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18409472703933716},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11175298690795898}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3564625.3564650","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3564650","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G2099857462","display_name":null,"funder_award_id":"61902138","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2115675703","https://openalex.org/W2151976397","https://openalex.org/W2156453323","https://openalex.org/W2256319980","https://openalex.org/W2312250904","https://openalex.org/W2393727648","https://openalex.org/W2543928808","https://openalex.org/W2766540688","https://openalex.org/W2768904474","https://openalex.org/W2768945008","https://openalex.org/W2785474195","https://openalex.org/W2809613546","https://openalex.org/W2914982603","https://openalex.org/W2964097210","https://openalex.org/W2985708757","https://openalex.org/W3007237867","https://openalex.org/W3047947484","https://openalex.org/W3111490787","https://openalex.org/W3208349710","https://openalex.org/W4244413641"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1544967040","https://openalex.org/W2594425278","https://openalex.org/W4226031521","https://openalex.org/W3160314615","https://openalex.org/W2381288267","https://openalex.org/W2155469080","https://openalex.org/W2299887038"],"abstract_inverted_index":{"Deep":[0],"Packet":[1],"Inspection":[2],"(DPI)":[3],"systems":[4,20,42,55,123,141,151,165,212,237,310],"are":[5,21,152,185],"essential":[6],"for":[7,33,188,282],"securing":[8],"modern":[9],"networks":[10],"(e.g.,":[11,126],"blocking":[12],"or":[13,71],"logging":[14],"abnormal":[15,88,112,130,169,183],"network":[16],"connections).":[17],"However,":[18],"DPI":[19,41,54,83,110,122,140,150,164,176,211,236,284,309],"known":[22],"to":[23,37,49,116,127,138,190,215,259,305],"be":[24,31],"vulnerable":[25],"in":[26,52,160,173],"their":[27],"implementations,":[28],"which":[29,63,106],"could":[30,107],"exploited":[32],"evasion":[34],"attacks.":[35],"Due":[36],"the":[38,53,109,121,129,145,163,174,200,206,227,257,260,267,278,293,301],"critical":[39],"role":[40],"play,":[43],"many":[44],"efforts":[45],"have":[46,254],"been":[47],"made":[48],"detect":[50,306],"vulnerabilities":[51,258],"through":[56,96],"manual":[57],"inspection,":[58],"symbolic":[59],"execution,":[60],"and":[61,142,240,242,249,262,295],"fuzzing,":[62],"suffer":[64],"from":[65],"either":[66],"poor":[67],"scalability,":[68],"path":[69],"explosion,":[70],"inappropriate":[72],"feedback.":[73],"In":[74],"this":[75,195],"paper,":[76],"based":[77],"on":[78],"our":[79],"observation":[80],"that":[81,103,180,204,288],"a":[82,92,100,167],"system":[84],"usually":[85],"reaches":[86],"an":[87,155],"internal":[89,113,157],"state":[90,146,158,170,207],"before":[91],"forbidden":[93],"packet":[94],"passes":[95],"it,":[97],"we":[98,132,197,231],"propose":[99],"fuzzing":[101,202,280],"framework":[102,203],"prioritizes":[104],"inputs/mutations":[105],"trigger":[108,181],"system\u2019s":[111],"states.":[114],"Further,":[115],"avoid":[117],"deep":[118],"understanding":[119],"of":[120,136,148,162,229,269,297,303],"under":[124],"inspection":[125],"identify":[128],"states),":[131],"feed":[133],"one":[134,161,264],"pair":[135],"inputs":[137,179],"multiple":[139],"check":[143],"whether":[144],"changes":[147],"these":[149],"consistent":[153],"\u2014":[154],"inconsistent":[156],"change/transference":[159],"indicates":[166],"new":[168,182,192,248],"is":[171],"reached":[172],"corresponding":[175],"system.":[177],"Naturally,":[178],"states":[184],"preferentially":[186],"selected":[187],"mutations":[189],"generate":[191],"inputs.":[193],"Following":[194],"idea,":[196],"develop":[198],"StateDiver,":[199,230],"first":[201],"uses":[205],"discrepancy":[208],"between":[209],"different":[210],"as":[213],"feedback":[214],"find":[216],"more":[217],"bypassing":[218,308],"strategies.":[219],"We":[220,253,272],"make":[221],"StateDiver":[222,275,289,304],"publicly":[223],"available":[224],"online.":[225],"With":[226],"help":[228],"tested":[232],"3":[233],"famous":[234],"open-source":[235],"(Snort,":[238],"Snort++,":[239],"Suricata)":[241],"discovered":[243],"16":[244],"bypass":[245],"strategies":[246,307],"(8":[247],"8":[250],"previously":[251],"known).":[252],"reported":[255],"all":[256],"vendors":[261],"received":[263],"CVE":[265],"by":[266],"time":[268],"paper":[270],"writing.":[271],"also":[273],"compared":[274],"with":[276],"Geneva,":[277],"state-of-the-art":[279],"tool":[281],"detecting":[283],"bugs.":[285],"Results":[286],"showed":[287],"outperformed":[290],"Geneva":[291],"at":[292],"number":[294],"speed":[296],"finding":[298],"vulnerabilities,":[299],"indicating":[300],"ability":[302],"effectively.":[311]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
