{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:15Z","timestamp":1725475935058},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_42","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T10:27:59Z","timestamp":1147343279000},"page":"385-394","source":"Crossref","is-referenced-by-count":2,"title":["A Model for Security Vulnerability Pattern"],"prefix":"10.1007","author":[{"given":"Hyungwoo","family":"Kang","sequence":"first","affiliation":[]},{"given":"Kibom","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Soonjwa","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"Aleph One: Smashing the stack for fun and profit. Phrack 49-14 (1996)"},{"key":"42_CR2","unstructured":"Wheeler, D.A.: Flawfinder, \n                    \n                      http:\/\/www.dwheeler.com\/flawfinder\/"},{"key":"42_CR3","unstructured":"RATS, \n                    \n                      http:\/\/www.securesw.com\/rats\/"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Viega, J., Bloch, J.T., Kohno, T., McGraw, G.: ITS4: A static vulnerability scanner for C and C++ code. ACM Transactions on Information and System Security\u00a05(2) (2002)","DOI":"10.1145\/545186.545188"},{"key":"42_CR5","unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Network and distributed system security symposium, San Diego, CA, pp. 3\u201317 (2000)"},{"key":"42_CR6","unstructured":"Foster, J.: Type qualifiers: Lightweight specifications to improve soft-ware quality. Ph.D. thesis. University of California, Berkeley (2002)"},{"key":"42_CR7","unstructured":"Evans, D.: SPLINT, \n                    \n                      http:\/\/www.splint.org\/"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Blanchet, B., Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Mine, A., Monniaux, D., Rival, X.: A Static Analyzer for Large Safety-Critical Software (2003)","DOI":"10.1145\/781131.781153"},{"key":"42_CR9","unstructured":"Abstract interpretation (2001), \n                    \n                      http:\/\/www.polyspace.com\/downloads.htm"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Zitser, M., Lippmann, R., Leek, T.: Testing Static Analysis Tools using Exploitable Buffer Overflows from Open Source Code. In: SIGSOFT 2004, pp. 97\u2013106 (2004)","DOI":"10.1145\/1041685.1029911"},{"issue":"5","key":"42_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/381694.378846","volume":"36","author":"T. Ball","year":"2001","unstructured":"Ball, T., Majumdar, R., Millstein, T., Rajamani, S.: Automatic predicate abstraction of C programs. PLDI. ACM SIGPLAN Not.\u00a036(5), 203\u2013213 (2001)","journal-title":"PLDI. ACM SIGPLAN Not."},{"key":"42_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-46002-0_12","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T. Ball","year":"2002","unstructured":"Ball, T., Podelski, A., Rajamani, S.: Relative completeness of abstraction refinement for software model checking. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 158\u2013172. Springer, Heidelberg (2002)"},{"key":"42_CR13","series-title":"LNCS","first-page":"72","volume-title":"29th ACM POPL","author":"T. Ball","year":"2002","unstructured":"Ball, T., Rajamani, S.: The SLAM project: debugging system software via static analysis. In: 29th ACM POPL. LNCS, vol.\u00a01254, pp. 72\u201383. Springer, Heidelberg (2002)"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Chen, H., Wagner, D.: MOPS: an infrastructure for examining security properties of software. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC (2002)","DOI":"10.1145\/586110.586142"},{"key":"42_CR15","unstructured":"Chen, H., Wagner, D., Dean, D.: Setuid demystified. In: Proceedings of the Eleventh Usenix Security Symposium, San Francisco, CA (2002)"},{"key":"42_CR16","unstructured":"Microsoft Security Bulletin MS03-007, \n                    \n                      http:\/\/www.microsoft.com\/technet\/security\/bulletin\/MS03-007.mspx.Microsoft\n                    \n                    \n                   (2003)"},{"key":"42_CR17","unstructured":"Microsoft Security Bulletin MS03-026, \n                    \n                      http:\/\/www.microsoft.com\/technet\/security\/bulletin\/MS03-026.mspx.Microsoft\n                    \n                    \n                   (2003)"},{"key":"42_CR18","volume-title":"Introduction to automata theory, languages, and computation","author":"J. Hopcroft","year":"1979","unstructured":"Hopcroft, J., Ullman, J.: Introduction to automata theory, languages, and computation. Addison-Wesley, Reading (1979)"},{"key":"42_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-45937-5_16","volume-title":"Compiler Construction","author":"G.C. Necula","year":"2002","unstructured":"Necula, G.C., McPeak, S., Rahul, S.P., Weimer, W.: CIL: Intermediate language and tools for analysis and transformation of C programs. In: Horspool, R.N. (ed.) CC 2002. LNCS, vol.\u00a02304, p. 213. Springer, Heidelberg (2002)"},{"issue":"1","key":"42_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1002\/(SICI)1096-9942(1998)4:1<27::AID-TAPO3>3.0.CO;2-4","volume":"4","author":"D. R\u00e9my","year":"1998","unstructured":"R\u00e9my, D., Vouillon, J.: Objective ML: An effective object-oriented extension of ML. Theory and Practice of Object Systems\u00a04(1), 27\u201352 (1998)","journal-title":"Theory and Practice of Object Systems"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:32:30Z","timestamp":1558294350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11751595_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}