{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T19:49:17Z","timestamp":1761853757763,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_26","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T21:20:42Z","timestamp":1537478442000},"page":"277-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The New Progress in the Research of Binary Vulnerability Exploits"],"prefix":"10.1007","author":[{"given":"Tiantian","family":"Tan","sequence":"first","affiliation":[]},{"given":"Baosheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhou","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2016.12.030","volume":"387","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Xiong, N.N., Vasilakos, A.V., et al.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. 387, 195\u2013204 (2016)","journal-title":"Inf. Sci."},{"issue":"99","key":"26_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/srds.2015.27","volume":"2015","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Zhu, Y., Sun, X.: Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 2015(99), 1\u20131 (2016). https:\/\/doi.org\/10.1109\/srds.2015.27","journal-title":"IEEE Trans. Cloud Comput."},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Cai, Z.P., Chen, M., Chen, S., et al.: Searching for widespread events in large networked systems by cooperative monitoring. In: IEEE International Conference on Network Protocols, pp. 123\u2013133, San Francisco (2015). https:\/\/doi.org\/10.1109\/icnp.2015.46","DOI":"10.1109\/icnp.2015.46"},{"issue":"3","key":"26_CR4","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/tc.2011.255","volume":"62","author":"Z Cai","year":"2013","unstructured":"Cai, Z., Wang, Z., Zheng, K.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417\u2013427 (2013). https:\/\/doi.org\/10.1109\/tc.2011.255","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"26_CR5","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.3724\/SP.J.1001.2011.03960","volume":"22","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Cai, Z.P., Zhong, P.: Detection approach of DDoS attacks based on conditional random fields. J. Softw. 22(8), 1897\u20131910 (2011)","journal-title":"J. Softw."},{"issue":"1","key":"26_CR6","first-page":"81","volume":"44","author":"C Miller","year":"2010","unstructured":"Miller, C., Caballero, J., Berkeley, U.: Crash analysis with BitBlaze. Revista Mexicana De Sociologa 44(1), 81\u2013117 (2010)","journal-title":"Revista Mexicana De Sociologa"},{"key":"26_CR7","unstructured":"Heelan, S., Kroening, D.: Automatic generation of control flow hijacking exploits for software vulnerabilities. M.Sc. Computer Science Dissertation (2009)"},{"key":"26_CR8","doi-asserted-by":"publisher","unstructured":"Tang, H., Huang, S., Li, Y., et al.: Dynamic taint analysis for vulnerability exploits detection. In: International Conference on Computer Engineering and Technology, vol. 2, pp. 215\u2013218 (2010). https:\/\/doi.org\/10.1109\/iccet.2010.5485224","DOI":"10.1109\/iccet.2010.5485224"},{"key":"26_CR9","first-page":"2388","volume":"28","author":"JX Ma","year":"2017","unstructured":"Ma, J.X., Li, Z.J., Zhang, T., Shen, D., Zhang, Z.K.: Taint analysis method based on offline indices of instruction trace. J. Softw. 28, 2388\u20132401 (2017)","journal-title":"J. Softw."},{"key":"26_CR10","unstructured":"Sheth, M.: System and method for facilitating static analysis of software applications, US 20160179486 (2016)"},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Schutte, J., Brost, G.S.: A data usage control system using dynamic taint tracking. In: International Conference on Advanced Information Networking and Applications, pp. 909\u2013916, IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/aina.2016.127","DOI":"10.1109\/aina.2016.127"},{"issue":"7","key":"26_CR12","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/11575467_5","volume-title":"Programming Languages and Systems","author":"J Berdine","year":"2005","unstructured":"Berdine, J., Calcagno, C., OHearn, P.W.: Symbolic execution with separation logic. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 52\u201368. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11575467_5"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/3-540-36577-X_40","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S Khurshid","year":"2003","unstructured":"Khurshid, S., P\u0102s\u0102reanu, C.S., Visser, W.: Generalized symbolic execution for model checking and testing. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol. 2619, pp. 553\u2013568. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36577-X_40"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Boyer, R.S., Elspas, B., Levitt, K.N.: SELECT-a formal system for testing and debugging programs by symbolic execution. In: International Conference on Reliable Software, vol. 10, pp. 234\u2013245 (1975). https:\/\/doi.org\/10.1145\/800027.808445","DOI":"10.1145\/800027.808445"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-52325-5_4","volume-title":"Climate Change Adaptation and Forest Dependent Communities","author":"JP Basu","year":"2017","unstructured":"Basu, J.P.: Vulnerability analysis. In: Basu, J.P. (ed.) Climate Change Adaptation and Forest Dependent Communities, pp. 57\u201358. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52325-5_4"},{"issue":"4","key":"26_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3092566","volume":"50","author":"SM Ghaffarian","year":"2017","unstructured":"Ghaffarian, S.M., Shahriari, H.R.: Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput. Surv. 50(4), 1\u201336 (2017)","journal-title":"ACM Comput. Surv."},{"key":"26_CR18","doi-asserted-by":"publisher","unstructured":"Albab, K.D., Issa, R., Lapets, A., et al.: Scalable secure multi-party network vulnerability analysis via symbolic optimization. In: IEEE Security and Privacy Workshops, pp. 211\u2013216. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/spw.2017.21","DOI":"10.1109\/spw.2017.21"},{"key":"26_CR19","unstructured":"Sheth, M.: System and method for facilitating static analysis of software applications. US 20160179486 (2016)"},{"key":"26_CR20","doi-asserted-by":"publisher","unstructured":"Brumley, D., Poosankam, P., Song, D., et al.: Automatic patch-based exploit generation is possible: techniques and implications. In: IEEE Symposium on Security and Privacy, pp. 143\u2013157 (2008). https:\/\/doi.org\/10.1109\/sp.2008.17","DOI":"10.1109\/sp.2008.17"},{"issue":"1","key":"26_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2630069","volume":"17","author":"L Allodi","year":"2014","unstructured":"Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1\u201320 (2014)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"26_CR22","unstructured":"Avgerinos, T., Sang, K.C., Hao, B.L.T., et al.: AEG: automatic exploit generation. In: Network and Distributed System Security Symposium. NDSS. DBLP, USA (2011)"},{"key":"26_CR23","unstructured":"Tsai, T., Singh, N.: Libsafe 2.0: detection of format string vulnerability exploits. White Paper (2001)"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Avgerinos, T., Rebert, A., Brumley, D., et al.: Unleashing mayhem on binary code. vol. 19, pp. 380\u2013394 (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"26_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-319-04283-1_14","volume-title":"Security and Privacy in Communication Networks","author":"M Wang","year":"2013","unstructured":"Wang, M., Su, P., Li, Q., Ying, L., Yang, Y., Feng, D.: Automatic polymorphic exploit generation for software vulnerabilities. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICST, vol. 127, pp. 216\u2013233. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-04283-1_14"},{"key":"26_CR26","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: Q: exploit hardening made easy. In: Usenix Conference on Security, pp. 25\u201325. USENIX Association (2011)"},{"key":"26_CR27","unstructured":"Hu, H., Zheng, L.C., Adrian, S., et al.: Automatic generation of data-oriented exploits (2015)"},{"key":"26_CR28","unstructured":"Jan, S., Panichella, A., Arcuri, A., et al.: Automatic generation of tests to exploit XML injection vulnerabilities in web applications. 99, 1\u20131 (2017)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T10:40:41Z","timestamp":1751971241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}