{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:07:37Z","timestamp":1729660057420,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/3pgcic.2014.100","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T12:30:11Z","timestamp":1423139411000},"page":"492-498","source":"Crossref","is-referenced-by-count":4,"title":["Program Crash Analysis Based on Taint Analysis"],"prefix":"10.1109","author":[{"given":"Zhang","family":"Puhan","sequence":"first","affiliation":[]},{"given":"Wu","family":"Jianxiong","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zehui","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"year":"0","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/2046707.2046713"},{"year":"0","key":"12"},{"key":"3","first-page":"59","article-title":"AEG: Automatic exploit generation[C]","volume":"11","author":"avgerinos","year":"2011","journal-title":"NDSS"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","article-title":"A general approach for efficiently accelerating software-based dynamic data flow tracking on commodity hardware[J]","author":"jee","year":"2012","journal-title":"the Proc of the 11th NDSS"},{"key":"7","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1145\/2508859.2516665","article-title":"Chucky: Exposing missing checks in source code for vulnerability discovery[C]","author":"yamaguchi","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1609956.1609960"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/SP.2010.26"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/2508859.2516704"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/2382196.2382216"},{"key":"8","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[C]","author":"newsome","year":"2005","journal-title":"Proc Symp Network and Distributed System Security"}],"event":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","start":{"date-parts":[[2014,11,8]]},"location":"Guangdong, China","end":{"date-parts":[[2014,11,10]]}},"container-title":["2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7002489\/7024297\/07024634.pdf?arnumber=7024634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:01:22Z","timestamp":1498179682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7024634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/3pgcic.2014.100","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}