{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T05:16:53Z","timestamp":1754111813328,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_12","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"247-269","source":"Crossref","is-referenced-by-count":9,"title":["Improving Accuracy of Static Integer Overflow Detection in Binary"],"prefix":"10.1007","author":[{"given":"Yang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaoshan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Shuke","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-540-78800-3_28","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S Anand","year":"2008","unstructured":"Anand, S., Godefroid, P., Tillmann, N.: Demand-driven compositional symbolic execution. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 367\u2013381. Springer, Heidelberg (2008)"},{"issue":"5","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/358438.349303","volume":"35","author":"V Bala","year":"2000","unstructured":"Bala, V., Duesterwald, E., Banerjia, S.: Dynamo: a transparent dynamic optimization system. SIGPLAN Not. 35(5), 1\u201312 (2000)","journal-title":"SIGPLAN Not."},{"key":"12_CR3","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI 2008, pp. 209\u2013224. USENIX Association, Berkeley (2008)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing mayhem on binary code. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 380\u2013394. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhang, Y., Cheng, L., Deng, Y., Sun, X.: Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability. In: 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 95\u2013100, July 2013","DOI":"10.1109\/COMPSACW.2013.14"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-11145-7_26","volume-title":"Information and Communications Security","author":"P Chen","year":"2009","unstructured":"Chen, P., Han, H., Wang, Y., Shen, X., Yin, X., Mao, B., Xie, L.: IntFinder: automatically detecting integer bugs in x86 binary program. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 336\u2013345. Springer, Heidelberg (2009)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Chen, P., Wang, Y., Xin, Z., Mao, B., Xie, L.: Brick: a binary tool for run-time detecting and locating integer-based vulnerability. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 208\u2013215 (2009)","DOI":"10.1109\/ARES.2009.77"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, S., Yang, J., Wang, J., Wang, J., Jiang, F.: Loongchecker: practical summary-based semi-simulation to detect vulnerability in binary code. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 150\u2013159, November 2011","DOI":"10.1109\/TrustCom.2011.22"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Chipounov, V., Kuznetsov, V., Candea, G.: S2e: a platform for in-vivo multi-path analysis of software systems. In: Proceedings of the Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XVI, pp. 265\u2013278. ACM, New York (2011)","DOI":"10.1145\/1950365.1950396"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Dietz, W., Li, P., Regehr, J., Adve, V.: Understanding integer overflow in C\/C++. In: Proceedings of the 34th International Conference on Software Engineering, ICSE 2012, pp. 760\u2013770. IEEE Press, Zurich (2012)","DOI":"10.1109\/ICSE.2012.6227142"},{"key":"12_CR11","unstructured":"Dijkstra, E.: Go to statement considered harmful. In: Classics in Software Engineering (incoll), pp. 27\u201333. Yourdon Press, Upper Saddle River (1979)"},{"issue":"3","key":"12_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: SAGE: whitebox fuzzing for security testing. Commun. ACM 55(3), 40 (2012)","journal-title":"Commun. ACM"},{"key":"12_CR13","unstructured":"Haller, I., Slowinska, A., Neugschwandtner, M., Bos, H.: Dowsing for overflows: a guided fuzzer to find buffer boundary violations. In: Proceedings of the 22nd USENIX Conference on Security, SEC 2013, pp. 49\u201364 (2013)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Hasabnis, N., Misra, A., Sekar, R.: Light-weight bounds checking. In: Proceedings of the Tenth International Symposium on Code Generation and Optimization, CGO 2012, pp. 135\u2013144. ACM, New York (2012)","DOI":"10.1145\/2259016.2259034"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Long, F., Sidiroglou-Douskos, S., Kim, D., Rinard, M.: Sound input filter generation for integer overflow errors. In: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2014, pp. 439\u2013452. ACM, New York (2014)","DOI":"10.1145\/2535838.2535888"},{"key":"12_CR16","unstructured":"Molnar, D., Li, X.C., Wagner, D.: Dynamic test generation to find integer bugs in x86 binary linux programs. In: Proceedings of the 18th Conference on USENIX Security Symposium, pp. 67\u201382. USENIX Association, Berkeley (2009)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Pomonis, M., Petsios, T., Jee, K., Polychronakis, M., Keromytis, A.D.: IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 416\u2013425. ACM, New Orleans (2014)","DOI":"10.1145\/2664243.2664282"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 317\u2013331 (2010)","DOI":"10.1109\/SP.2010.26"},{"issue":"5","key":"12_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/1095430.1081750","volume":"30","author":"K Sen","year":"2005","unstructured":"Sen, K., Marinov, D., Agha, G.: Cute: A concolic unit testing engine for c. SIGSOFT Softw. Eng. Notes 30(5), 263\u2013272 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Sidiroglou-Douskos, S., Lahtinen, E., Rittenhouse, N., Piselli, P., Long, F., Kim, D., Rinard, M.: Targeted automatic integer overflow discovery using goal-directed conditional branch enforcement. In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2015, pp. 473\u2013486. ACM, New York (2015)","DOI":"10.1145\/2775054.2694389"},{"key":"12_CR21","volume-title":"Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities","author":"A Simon","year":"2010","unstructured":"Simon, A.: Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities. Springer, Heidelberg (2010)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: a new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"12_CR23","unstructured":"Stephen, M., Dawnsong, M.P.: DTA++: dynamic taint analysiswith targetedcontrol-flow propagation. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS), pp. 269\u2013282, February 2011"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Wang, T., Wei, T., Gu, G., Zou, W.: TaintScope: a checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 497\u2013512, May 2010","DOI":"10.1109\/SP.2010.37"},{"key":"12_CR25","unstructured":"Wang, T., Wei, T., Lin, Z., Zou, W.: IntScope: automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In: Proceedings of the Network and Distributed System Security Symposium (2009)"},{"key":"12_CR26","unstructured":"Wang, X., Chen, H., Jia, Z., Zeldovich, N., Kaashoek, M.F.: Improving integer security for systems with KINT. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pp. 163\u2013177 (2012)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 590\u2013604 (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"12_CR28","unstructured":"Yamaguchi, F., Lindner, F., Rieck, K.: Vulnerability extrapolation: assisted discovery of vulnerabilities using machine learning. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT 2011, p. 13 (2011)"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Wressnegger, C., Gascon, H., Rieck, K.: Chucky: exposing missing checks in source code for vulnerability discovery. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 499\u2013510 (2013)","DOI":"10.1145\/2508859.2516665"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., Wang, X.S.: AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 1043\u20131054. ACM, New York (2013)","DOI":"10.1145\/2508859.2516676"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-15497-3_5","volume-title":"Computer Security \u2013 ESORICS 2010","author":"C Zhang","year":"2010","unstructured":"Zhang, C., Wang, T., Wei, T., Chen, Y., Zou, W.: IntPatch: automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 71\u201386. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:26:04Z","timestamp":1748665564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}