{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:48:42Z","timestamp":1725990522769},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ares.2013.59","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T17:22:24Z","timestamp":1384190544000},"page":"446-454","source":"Crossref","is-referenced-by-count":21,"title":["Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution"],"prefix":"10.1109","author":[{"given":"Hongzhe","family":"Li","sequence":"first","affiliation":[]},{"given":"Taebeom","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Munkhbayar","family":"Bat-Erdene","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1180405.1180445"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/1455518.1455522"},{"year":"2008","author":"sezer","journal-title":"Eighth IEEE International Working Conference on Source Code Analysis and Manipulation","article-title":"Automated detection of code vulnerabilities based on program analysis and model checking","key":"15"},{"year":"2008","author":"godefroid","journal-title":"Proceedings of the Network and Distributed Systems Security (NDSS)","article-title":"Automated whitebox fuzz testing","key":"16"},{"year":"0","author":"wheeler","journal-title":"Flawfinder","key":"13"},{"year":"0","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ACSAC.2000.898880"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1315245.1315314"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/11537328_2","article-title":"Execution generated test cases :How to make systems code crash itself","author":"cadar","year":"2005","journal-title":"10th Int SPIN Workshop on Model Checking Software"},{"year":"2000","author":"wagner","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS)","article-title":"A first step towards automated detection of buffer overrun vulnerabilities","key":"2"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1109\/DSN.2010.5544310","article-title":"Detecting vulnerabilities in c programs using trace-based testing","author":"zhang","year":"2010","journal-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102166","article-title":"Preventing formatstring attacks via automatic and efficient dynamic checking","author":"ringenburg","year":"2005","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS)"},{"year":"1994","author":"fink","journal-title":"Proceedings of Irvine Software Symposium","article-title":"Towards a property-based testing environment with applications to security-critical software","key":"7"},{"year":"1992","author":"hastings","journal-title":"Proceedings of the Winter USENIX Conference","article-title":"Purify: Fast detection of memory leaks and access errors","key":"6"},{"year":"2003","author":"haugh","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","article-title":"Testing C programs for buffer overflow vulnerabilities","key":"5"},{"year":"2005","author":"sen","journal-title":"Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering","article-title":"CUTE: A concolic unit testing engine for C","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1065010.1065036"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/SECPRI.1998.674827"}],"event":{"name":"2013 Eighth International Conference on Availability, Reliability and Security (ARES)","start":{"date-parts":[[2013,9,2]]},"location":"Regensburg, Germany","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656131\/6657192\/06657275.pdf?arnumber=6657275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T09:13:43Z","timestamp":1564650823000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6657275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ares.2013.59","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}