{"id":"https://openalex.org/W2900868537","doi":"https://doi.org/10.1109/secdev.2018.00028","title":"Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle","display_name":"Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2900868537","doi":"https://doi.org/10.1109/secdev.2018.00028","mag":"2900868537"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/secdev.2018.00028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111581516","display_name":"Peter Goodman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peter Goodman","raw_affiliation_strings":["Trail of Bits, Inc."],"affiliations":[{"raw_affiliation_string":"Trail of Bits, Inc.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048781020","display_name":"Gustavo Grieco","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gustavo Grieco","raw_affiliation_strings":["Trail of Bits, Inc."],"affiliations":[{"raw_affiliation_string":"Trail of Bits, Inc.","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026932942","display_name":"Alex Groce","orcid":"https://orcid.org/0000-0003-0273-4668"},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"funder","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Groce","raw_affiliation_strings":["School of Informatics Computing & Cyber Systems, Northern Arizona University"],"affiliations":[{"raw_affiliation_string":"School of Informatics Computing & Cyber Systems, Northern Arizona University","institution_ids":["https://openalex.org/I203172682"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.752,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.814086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":null,"issue":null,"first_page":"130","last_page":"131"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9250652},{"id":"https://openalex.org/keywords/unit-testing","display_name":"Unit testing","score":0.7180985},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.60744464},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security Testing","score":0.41768292}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9250652},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8621872},{"id":"https://openalex.org/C148027188","wikidata":"https://www.wikidata.org/wiki/Q907375","display_name":"Unit testing","level":3,"score":0.7180985},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.60744464},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.57716185},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5320151},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.45862976},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.41768292},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3990272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27508104},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2189121},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1441099},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12973773},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/secdev.2018.00028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W2119717320","https://openalex.org/W2133900335","https://openalex.org/W2574017551","https://openalex.org/W2883567471","https://openalex.org/W4244488020","https://openalex.org/W4250436085"],"related_works":["https://openalex.org/W4290048282","https://openalex.org/W4285245977","https://openalex.org/W4240738830","https://openalex.org/W3203826058","https://openalex.org/W3104446232","https://openalex.org/W2914996832","https://openalex.org/W2785720764","https://openalex.org/W2777046235","https://openalex.org/W2768829148","https://openalex.org/W2186070848"],"abstract_inverted_index":{"Traditionally,":[0],"methods":[1],"such":[2,123,130],"as":[3,44,124,131],"binary":[4],"analysis,":[5],"symbolic":[6,120],"execution,":[7],"and":[8,94,114,126,128,151,180,198,201,221],"fuzzing":[9],"have":[10],"been":[11],"used":[12,76],"in":[13,27,38,42,55,62,87,97,169,191],"a":[14,63,107,148],"context":[15],"that":[16,90,105,172],"is":[17,40,51,101],"strongly":[18],"geared":[19],"towards":[20],"discovering":[21],"existing":[22],"vulnerabilities,":[23],"rather":[24],"than":[25,135],"use":[26,153,189],"the":[28,47,74,81,88,208,222],"development":[29,48,82,220],"cycle":[30,83],"to":[31,58,111,119,156,160,188,194,203,210],"prevent":[32],"vulnerabilities":[33,159],"from":[34],"arising.":[35],"Unit":[36],"testing,":[37,176],"contrast,":[39],"firmly":[41],"place":[43],"part":[45],"of":[46,70,206],"cycle,":[49],"but":[50],"usually":[52],"very":[53],"limited":[54],"its":[56],"ability":[57,209],"explore":[59],"\"deep\"":[60],"paths":[61],"system,":[64],"or":[65],"expose":[66],"completely":[67],"un-anticipated":[68],"aspects":[69],"system":[71],"behavior.":[72],"Incorporating":[73],"tools":[75,154],"for":[77,146,167,216,225],"vulnerability":[78],"discovery":[79],"into":[80],"requires":[84],"large":[85],"expansion":[86],"expertise":[89],"developers":[91,116,140],"must":[92],"possess,":[93],"significant":[95],"changes":[96],"their":[98],"practices.":[99],"DeepState":[100,190],"an":[102,170],"open-source":[103],"tool":[104],"provides":[106],"Google":[108],"Test-like":[109],"API":[110,199],"give":[112],"C":[113],"C++":[115],"push-button":[117],"access":[118],"execution":[121],"engines,":[122],"Manticore":[125],"angr,":[127],"fuzzers,":[129],"Dr.":[132],"Fuzz.":[133],"Rather":[134],"learning":[136],"multiple":[137,213],"complex":[138,196],"tools,":[139],"can":[141,152],"learn":[142],"one":[143],"(familiar)":[144],"interface":[145],"defining":[147],"test":[149,217],"harness,":[150],"built":[155],"find":[157],"security":[158,177],"automatically":[161],"generate":[162],"more":[163],"powerful":[164],"unit":[165,175],"tests":[166],"software,":[168],"approach":[171],"merges":[173],"traditional":[174],"analysis":[178],"methods,":[179],"property-based":[181],"testing.":[182],"This":[183],"tutorial":[184],"will":[185],"show":[186],"how":[187,202],"development,":[192],"including":[193],"produce":[195],"library":[197],"tests,":[200],"take":[204],"advantage":[205],"both":[207],"easily":[211],"apply":[212],"security-oriented":[214],"back-ends":[215],"generation":[218],"during":[219],"novel":[223],"strategies":[224],"improving":[226],"back-end":[227],"performance":[228],"provided":[229],"by":[230],"DeepState.":[231]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2900868537","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-04-16T04:14:47.093719","created_date":"2018-11-29"}