{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:27Z","timestamp":1740099147202,"version":"3.37.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_25","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"265-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The New Progress in the Research of Binary Vulnerability Analysis"],"prefix":"10.1007","author":[{"given":"Tiantian","family":"Tan","sequence":"first","affiliation":[]},{"given":"Baosheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhou","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"25_CR1","first-page":"1","volume":"99","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Zhu, Y., Sun, X., et al.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 2015 99, 1 (2016)","journal-title":"IEEE Trans. Cloud Comput. 2015"},{"key":"25_CR2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2016.12.030","volume":"387","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Xiong, N.N., Vasilakos, A.V., et al.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195\u2013204 (2016)","journal-title":"Inf. Sci."},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Cai, Z.P., Chen, M., Chen, S., et al.: Searching for widespread events in large networked systems by cooperative monitoring. In: IEEE International Conference on Network Protocols, San Francisco, pp. 123\u2013133 (2015). \nhttps:\/\/doi.org\/10.1109\/icnp.2015.46","DOI":"10.1109\/icnp.2015.46"},{"issue":"3","key":"25_CR4","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/tc.2011.255","volume":"62","author":"Z Cai","year":"2013","unstructured":"Cai, Z., Wang, Z., Zheng, K., et al.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417\u2013427 (2013). \nhttps:\/\/doi.org\/10.1109\/tc.2011.255","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"25_CR5","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.3724\/SP.J.1001.2011.03960","volume":"22","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Cai, Z.P., Zhong, P., et al.: Detection approach of DDoS attacks based on conditional random fields. J. Softw. 22(8), 1897\u20131910 (2011)","journal-title":"J. Softw."},{"key":"25_CR6","first-page":"1309","volume":"10","author":"S Wu","year":"2012","unstructured":"Wu, S., Guo, T., Dong, G., et al.: Software vulnerability analysis: a road map. J. Tsinghua Univ. (Sci. Technol.) 10, 1309\u20131319 (2012)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"issue":"10","key":"25_CR7","first-page":"1320","volume":"52","author":"Z Jianwei","year":"2012","unstructured":"Jianwei, Z., Chen, L., Fan, T., et al.: Type-based dynamic taint analysis technology. J. Tsinghua Univ. 52(10), 1320\u20131328 (2012)","journal-title":"J. Tsinghua Univ."},{"issue":"12","key":"25_CR8","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1587\/transinf.E93.D.3410","volume":"93","author":"H Bai","year":"2010","unstructured":"Bai, H., Chang-Zhen, H.U., Zhang, G., et al.: Binary oriented vulnerability analyzer based on hidden Markov model. IEICE Trans. Inf. Syst. 93(12), 3410\u20133413 (2010)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-642-03095-6_48","volume-title":"Algorithms and Architectures for Parallel Processing","author":"X Li","year":"2009","unstructured":"Li, X., Zheng, D., Ma, R., Liang, A., Guan, H.: MTCrossBit: a dynamic binary translation system using multithreaded optimization framework. In: Hua, A., Chang, S.-L. (eds.) ICA3PP 2009. LNCS, vol. 5574, pp. 502\u2013512. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03095-6_48"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., et al.: BitBlaze: a new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1\u201325. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-89862-7_1"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Yan, S., Kruegel, C., Vigna, G., et al.: SOK: (state of) the art of war: offensive techniques in binary analysis. In: IEEE Security and Privacy, pp. 138\u2013157 (2016). \nhttps:\/\/doi.org\/10.1109\/sp.2016.17","DOI":"10.1109\/sp.2016.17"},{"issue":"6","key":"25_CR12","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Not. 42(6), 89\u2013100 (2007)","journal-title":"ACM SIGPLAN Not."},{"issue":"5","key":"25_CR13","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"25_CR14","doi-asserted-by":"crossref","first-page":"2036","DOI":"10.3724\/SP.J.1001.2011.03874","volume":"22","author":"H Qiang","year":"2011","unstructured":"Qiang, H., Zeng, Q.K.: Taint propagation analysis and dynamic verification with information flow policy. J. Softw. 22, 2036\u20132048 (2011)","journal-title":"J. Softw."},{"issue":"3","key":"25_CR15","first-page":"12","volume":"40","author":"DW Shi","year":"2014","unstructured":"Shi, D.W., Yuan, T.W.: A dynamic taint analysis method combined with coarse-grained and fine-grained. Comput. Eng. 40(3), 12\u201317 (2014)","journal-title":"Comput. Eng."},{"key":"25_CR16","unstructured":"Dai, W., Liu, Z., Liu, Y.H.: Binary code-based dynamic taint analysis. Appl. Res. Comput. (2014)"},{"key":"25_CR17","unstructured":"Ma, J.-X., Li, Z.-J., Zhang, T., et al.: Taint analysis method based on offline indices of instruction trace. J. Softw. (2017)"},{"key":"25_CR18","unstructured":"Wang, L., Li, F., Li, L., et al.: Principle and practice of taint analysis. J. Softw. (2017)"},{"issue":"5","key":"25_CR19","first-page":"720","volume":"29","author":"J Newsome","year":"2005","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Chin. J. Eng. Math. 29(5), 720\u2013724 (2005)","journal-title":"Chin. J. Eng. Math."},{"key":"25_CR20","doi-asserted-by":"publisher","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, pp. 196\u2013206. ACM (2007). \nhttps:\/\/doi.org\/10.1145\/1273463.1273490","DOI":"10.1145\/1273463.1273490"},{"key":"25_CR21","doi-asserted-by":"publisher","unstructured":"Qin, F., Wang, C., Li, Z., et al.: LIFT: a low-overhead practical information flow tracking system for detecting security attacks. In: IEEE\/ACM International Symposium on Microarchitecture, pp. 135\u2013148. IEEE (2006).\nhttps:\/\/doi.org\/10.1109\/micro.2006.29","DOI":"10.1109\/micro.2006.29"},{"issue":"2","key":"25_CR22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s11859-015-1069-x","volume":"20","author":"Y Ouyang","year":"2015","unstructured":"Ouyang, Y., Wang, Q., Peng, J., et al.: An advanced automatic construction method of ROP. Wuhan Univ. J. Nat. Sci. 20(2), 119\u2013128 (2015)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"25_CR23","unstructured":"Lin, W., Cai, R., Zhu, Y., et al.: Optimization method of taint propagation analysis based on semantic rules. J. Comput. Appl. (2014)"},{"key":"25_CR24","unstructured":"Zhu, Z.X., Zeng, F.P., Huang, X.Y.: Dynamic symbolic taint analysis of binary programs. Comput. Sci. (2016)"},{"key":"25_CR25","unstructured":"Molnar, D., Li, X.C., Wagner, D.A.: Dynamic test generation to find integer bugs in x86 binary linux programs. In: Conference on Usenix Security Symposium, pp. 67\u201382. USENIX Association (2009)"},{"key":"25_CR26","unstructured":"Molnar, D.A.: Automated whitebox fuzz testing. In: Network and Distributed System Security Symposium. NDSS, California (2008). DBLP, USA (2011)"},{"key":"25_CR27","doi-asserted-by":"publisher","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. In: European Software Engineering Conference Held Jointly with, ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 263\u2013272. ACM (2005). \nhttps:\/\/doi.org\/10.21236\/ada482657","DOI":"10.21236\/ada482657"},{"key":"25_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-19237-1_4","volume-title":"Hardware and Software: Verification and Testing","author":"K Sen","year":"2011","unstructured":"Sen, K.: DART: directed automated random testing. In: Namjoshi, K., Zeller, A., Ziv, A. (eds.) HVC 2009. LNCS, vol. 6405, pp. 213\u2013223. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-19237-1_4"},{"key":"25_CR29","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: USENIX Conference on Operating Systems Design and Implementation, pp. 209\u2013224. USENIX Association (2009)"},{"key":"25_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-78800-3_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"P Boonstoppel","year":"2008","unstructured":"Boonstoppel, P., Cadar, C., Engler, D.: RWset: attacking path explosion in constraint-based test generation. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 351\u2013366. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-78800-3_27"},{"issue":"12","key":"25_CR31","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"25_CR32","doi-asserted-by":"publisher","unstructured":"Wang, T., Wei, T., Gu, G., et al.: TaintScope: a checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: IEEE Symposium on Security and Privacy, pp. 497\u2013512. IEEE Computer Society (2010). \nhttps:\/\/doi.org\/10.1109\/sp.2010.37","DOI":"10.1109\/sp.2010.37"},{"key":"25_CR33","doi-asserted-by":"crossref","first-page":"4050","DOI":"10.4028\/www.scientific.net\/AMR.756-759.4050","volume":"756\u2013759","author":"XY Zhu","year":"2013","unstructured":"Zhu, X.Y., Wu, Z.Y.: A new fuzzing technique using niche genetic algorithm. Adv. Mater. Res. 756\u2013759, 4050\u20134058 (2013)","journal-title":"Adv. Mater. Res."},{"issue":"3","key":"25_CR34","first-page":"829","volume":"27","author":"ZY Wu","year":"2010","unstructured":"Wu, Z.Y., Wang, H.C., Sun, L.C., et al.: Survey on fuzzing. Appl. Res. Comput. 27(3), 829\u2013832 (2010)","journal-title":"Appl. Res. Comput."},{"key":"25_CR35","doi-asserted-by":"publisher","unstructured":"Heelan, S., Gianni, A.: Augmenting vulnerability analysis of binary code. In: Computer Security Applications Conference, pp. 199\u2013208. ACM (2012). \nhttps:\/\/doi.org\/10.1145\/2420950.2420981","DOI":"10.1145\/2420950.2420981"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:37:05Z","timestamp":1537465025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}