{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T13:40:09Z","timestamp":1743946809150,"version":"3.40.3"},"reference-count":31,"publisher":"Elsevier BV","issue":"7","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1016\/j.compeleceng.2012.07.005","type":"journal-article","created":{"date-parts":[[2012,8,2]],"date-time":"2012-08-02T18:00:31Z","timestamp":1343930431000},"page":"2233-2242","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"title":["ARMORY: An automatic security testing tool for buffer overflow defect detection"],"prefix":"10.1016","volume":"39","author":[{"given":"Li-Han","family":"Chen","sequence":"first","affiliation":[]},{"given":"Fu-Hau","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Yanling","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Mu-Chun","family":"Su","sequence":"additional","affiliation":[]},{"given":"Wei-Shinn","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Chi-Hsuan","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2012.07.005_b0005","unstructured":"Namestnikov Y. Kaspersky security bulletin. Statistics 2011 \u2013 securelist. http:\/\/www.securelist.com\/en\/analysis\/204792216\/Kaspersky_Security_Bulletin_Statistics_2011, 2011. Accessed:06\/07\/2012."},{"key":"10.1016\/j.compeleceng.2012.07.005_b0010","series-title":"Proc 13th ACM Conf Comput Commun Secur, CCS \u201906","first-page":"322","article-title":"Exe: automatically generating inputs of death","author":"Cadar","year":"2006"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0015","series-title":"Proc 2008 Int Symp Software Test Anal, ISSTA \u201908","first-page":"27","article-title":"Testing for buffer overflows with length abstraction","author":"Xu","year":"2008"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0020","series-title":"Proc 12th ACM Conf Comput Commun Secur, CCS \u201905","first-page":"340","article-title":"\u2018Control-flow integrity","author":"Abadi","year":"2005"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0025","series-title":"Proc 2008 IEEE Symp Secur Privacy, SP \u201908","first-page":"263","article-title":"Preventing memory error exploits with wit","author":"Akritidis","year":"2008"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0030","first-page":"8","article-title":"Address obfuscation: an efficient approach to combat a board range of memory error exploits","volume":"vol. 12","author":"Bhatkar","year":"2003"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0035","first-page":"5","article-title":"Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","volume":"vol. 7","author":"Cowan","year":"1998"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0040","unstructured":"Newsome J, Song DX. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proc Network Distribut Sys Secur Symp; 2005."},{"key":"10.1016\/j.compeleceng.2012.07.005_b0045","unstructured":"Team TP, Homepage of the pax team; 2012. http:\/\/pax.grsecurity.net\/. [accessed 06.07.2012]."},{"key":"10.1016\/j.compeleceng.2012.07.005_b0050","article-title":"Sigfree: a signature-free buffer overflow attack blocker","volume":"vol. 15","author":"Wang","year":"2006"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0055","series-title":"Proc 7th Symp Operat Sys Des Implementation, OSDI \u201906","first-page":"147","article-title":"Securing software by enforcing data-flow integrity","author":"Castro","year":"2006"},{"issue":"3","key":"10.1016\/j.compeleceng.2012.07.005_b0060","first-page":"869","article-title":"A robust kernel-based solution to control-hijacking buffer overflow attacks","volume":"27","author":"Chen","year":"2011","journal-title":"J Inf Sci Eng"},{"issue":"11","key":"10.1016\/j.compeleceng.2012.07.005_b0065","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1016\/j.jss.2010.06.045","article-title":"Hsp: a solution against heap sprays","volume":"83","author":"Hsu","year":"2010","journal-title":"J Sys Softw"},{"issue":"March","key":"10.1016\/j.compeleceng.2012.07.005_b0070","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/1057387.1057388","article-title":"Symbolic bounds analysis of pointers, array indices, and accessed memory regions","volume":"27","author":"Rugina","year":"2005","journal-title":"ACM Trans Program Lang Syst"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0075","doi-asserted-by":"crossref","unstructured":"Chess B. Improving computer security using extended static checking. In: Proc 2002 IEEE Symp Secur Privacy, SP \u201902, IEEE Computer Society, Washington, DC, USA, 2002, pp. 160\u2013173.","DOI":"10.1109\/SECPRI.2002.1004369"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0080","first-page":"14","article-title":"Statically detecting likely buffer overflow vulnerabilities","volume":"vol. 10","author":"Larochelle","year":"2001"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0085","series-title":"Proc 14th ACM Conf Comput Commun Secur, CCS \u201907","first-page":"562","article-title":"Memsherlock: an automated debugger for unknown memory corruption vulnerabilities","author":"Sezer","year":"2007"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0090","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","article-title":"The daikon system for dynamic detection of likely invariants","volume":"69","author":"Ernst","year":"2007","journal-title":"Sci Comput Program"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0095","series-title":"Proc 24th Int Conf Softw Eng, ICSE \u201902","first-page":"291","article-title":"Tracking down software bugs using automatic anomaly detection","author":"Hangal","year":"2002"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0100","series-title":"Proc 37th Ann IEEE\/ACM Int Symp Microarchitect, MICRO 37","first-page":"269","article-title":"Accmon: Automatically detecting memory-related bugs via program counter-based invariants","author":"Zhou","year":"2004"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0105","doi-asserted-by":"crossref","unstructured":"Kil C, Sezer E, Ning P, Zhang X. Automated security debugging using program structural constraints. In: Comput Secur Appl Conf, 2007. ACSAC 2007. Twenty-Third Annual; 2007. pp. 453 \u201362.","DOI":"10.1109\/ACSAC.2007.19"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0110","unstructured":"Godefroid P, Levin MY, Molnar DA. Automated whitebox fuzz testing. In: Proc Network Distrib Sys Secur Symp, The Internet Society; 2008."},{"issue":"1","key":"10.1016\/j.compeleceng.2012.07.005_b0115","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1080\/00207217.2011.609983","article-title":"Analytical formula for three points sinusoidal signals amplitude estimation errors","volume":"99","author":"Vizireanua","year":"2012","journal-title":"Int J Electr"},{"issue":"2","key":"10.1016\/j.compeleceng.2012.07.005_b0120","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1016\/j.measurement.2010.11.001","article-title":"A simple and precise real-time four point single sinusoid signals instantaneous frequency estimation method for portable dsp based instrumentation","volume":"44","author":"Vizireanua","year":"2011","journal-title":"Measurement"},{"issue":"2","key":"10.1016\/j.compeleceng.2012.07.005_b0125","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.compeleceng.2008.06.010","article-title":"A compiler-hardware approach to software protection for embedded systems","volume":"35","author":"Gelbart","year":"2009","journal-title":"Comput Electr Eng"},{"issue":"4","key":"10.1016\/j.compeleceng.2012.07.005_b0130","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.compeleceng.2011.05.005","article-title":"Fault diagnosis in reversible circuits under missing-gate fault model","volume":"37","author":"Rahaman","year":"2011","journal-title":"Comput Electr Eng"},{"issue":"3","key":"10.1016\/j.compeleceng.2012.07.005_b0135","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.compeleceng.2011.03.008","article-title":"Test data compression based on geometric shapes","volume":"37","author":"El-Maleh","year":"2011","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0140","doi-asserted-by":"crossref","first-page":"3125","DOI":"10.1016\/j.cor.2007.01.013","article-title":"Detecting buffer overflow via automatic test input data generation","volume":"35","author":"Del Grosso","year":"2008","journal-title":"Comput Oper Res"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0145","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/1095430.1081750","article-title":"Cute: a concolic unit testing engine for c","volume":"30","author":"Sen","year":"2005","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0150","series-title":"Proc 2008 32nd Ann IEEE Int Comput Softw Appl Conf, COMPSAC \u201908","first-page":"979","article-title":"Mutation-based testing of buffer overflow vulnerabilities","author":"Shahriar","year":"2008"},{"key":"10.1016\/j.compeleceng.2012.07.005_b0155","unstructured":"Kratkiewicz KJ. Evaluating static analysis tools for detecting buffer overflows in c code. Master\u2019s thesis, Harvard University; March 2005."}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790612001309?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790612001309?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T13:10:20Z","timestamp":1743945020000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790612001309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["S0045790612001309"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2012.07.005","relation":{},"ISSN":["0045-7906"],"issn-type":[{"type":"print","value":"0045-7906"}],"subject":[],"published":{"date-parts":[[2013,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ARMORY: An automatic security testing tool for buffer overflow defect detection","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2012.07.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2012 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}