{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:24:43Z","timestamp":1742941483104,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458700"},{"type":"electronic","value":"9783319458717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_21","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T04:25:24Z","timestamp":1472099124000},"page":"343-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing"],"prefix":"10.1007","author":[{"given":"Guanhua","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yunus","family":"Kucuk","sequence":"additional","affiliation":[]},{"given":"Max","family":"Slocum","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Last","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"21_CR1","unstructured":"Crest: Concolic test generation tool for c. \n                      https:\/\/jburnim.github.io\/crest\/"},{"key":"21_CR2","unstructured":"http:\/\/www.securityweek.com\/shellshock-attacks-could-already-top-1-billion-report"},{"key":"21_CR3","unstructured":"Stp constraint solver. \n                      http:\/\/stp.github.io\/"},{"key":"21_CR4","unstructured":"https:\/\/nvd.nist.gov\/"},{"key":"21_CR5","unstructured":"https:\/\/www.exploit-db.com\/"},{"key":"21_CR6","unstructured":"http:\/\/www.osvdb.org\/"},{"key":"21_CR7","unstructured":"The Yices SMT Solver. \n                      http:\/\/yices.csl.sri.com"},{"key":"21_CR8","first-page":"59","volume":"11","author":"T Avgerinos","year":"2011","unstructured":"Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: AEG: automatic exploit generation. NDSS 11, 59\u201366 (2011)","journal-title":"NDSS"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2006.101","volume":"4","author":"SM Bellovin","year":"2006","unstructured":"Bellovin, S.M.: On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 4(4), 96 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Brumley, D., Poosankam, P., Song, D., Zheng, J.: Automatic patch-based exploit generation is possible: techniques and implications. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.17"},{"key":"21_CR11","first-page":"209","volume":"8","author":"C Cadar","year":"2008","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. OSDI 8, 209\u2013224 (2008)","journal-title":"OSDI"},{"issue":"2","key":"21_CR12","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1455518.1455522","volume":"12","author":"C Cadar","year":"2008","unstructured":"Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: automatically generating inputs of death. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(2), 10 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2), 82\u201390 (2013)","journal-title":"Commun. ACM"},{"key":"21_CR14","unstructured":"CERT. Basic fuzzing framework (bff). \n                      https:\/\/www.cert.org\/vulnerability-analysis\/tools\/bff.cfm?"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing mayhem on binary code. In: IEEE Symposium on Security and Privacy (SP), pp. 380\u2013394. IEEE (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Woo, M., Brumley, D.: Program-adaptive mutational fuzzing. In: Proceedings of the IEEE Symposium on Security and Privacy (2015)","DOI":"10.1109\/SP.2015.50"},{"issue":"2","key":"21_CR17","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/0004-3702(90)90060-D","volume":"42","author":"GF Cooper","year":"1990","unstructured":"Cooper, G.F.: The computational complexity of probabilistic inference using Bayesian belief networks. Artif. Intell. 42(2), 393\u2013405 (1990)","journal-title":"Artif. Intell."},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2090147.2094081","volume":"10","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: SAGE: whitebox fuzzing for security testing. Queue 10(1), 20 (2012)","journal-title":"Queue"},{"key":"21_CR19","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A.: Automated whitebox fuzz testing. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2008)"},{"key":"21_CR20","unstructured":"Griffiths, T.L., Kemp, C., Tenenbaum, J.B.: Bayesian models of cognition (2008)"},{"key":"21_CR21","volume-title":"Exploiting Software: How to Break Code","author":"G Hoglund","year":"2004","unstructured":"Hoglund, G., McGraw, G.: Exploiting Software: How to Break Code. Addison-Wesley, Boston (2004)"},{"key":"21_CR22","volume-title":"Directions in Security Metrics Research","author":"W Jansen","year":"2010","unstructured":"Jansen, W.: Directions in Security Metrics Research. Diane Publishing, Collingdale (2010)"},{"key":"21_CR23","unstructured":"Lebiere, C., Bennati, S., Thomson, R., Shakarian, P., Nunes, E.: Functional cognitive models of malware identification. In: Proceedings of International Conference on Cognitive Modeling (2015)"},{"issue":"3","key":"21_CR24","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"PK Manadhata","year":"2011","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Soft. Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"McMorrow, D.: Science of cyber-security. Technical report, JASON Program Office (2010)","DOI":"10.21236\/ADA534220"},{"key":"21_CR26","unstructured":"Nagaraju, S., Craioveanu, C., Florio, E., Miller, M.: Software vulnerability exploitation trends (2013)"},{"key":"21_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-319-11379-1_21","volume-title":"Research in Attacks, Intrusions and Defenses","author":"K Nayak","year":"2014","unstructured":"Nayak, K., Marino, D., Efstathopoulos, P., Dumitra\u015f, T.: Some vulnerabilities are different than others. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 426\u2013446. Springer, Heidelberg (2014)"},{"key":"21_CR28","unstructured":"Forum of Incident Response and Security Teams (FIRST). Common vulnerabilities scoring system (cvss). \n                      http:\/\/www.first.org\/cvss\/"},{"issue":"3","key":"21_CR29","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.cognition.2010.11.015","volume":"120","author":"A Perfors","year":"2011","unstructured":"Perfors, A., Tenenbaum, J.B., Griffiths, T.L., Xu, F.: A tutorial introduction to bayesian models of cognitive development. Cognition 120(3), 302\u2013321 (2011)","journal-title":"Cognition"},{"key":"21_CR30","unstructured":"Rebert, A., Cha, S.K., Avgerinos, T., Foote, J., Warren, D., Grieco, G., Brumley, D.: Optimizing seed selection for fuzzing. In: Proceedings of the USENIX Security Symposium (2014)"},{"key":"21_CR31","unstructured":"Microsoft Research. Z3. \n                      https:\/\/github.com\/Z3Prover\/z3"},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.126","volume":"5","author":"SW Smith","year":"2012","unstructured":"Smith, S.W.: Security and cognitive bias: exploring the role of the mind. IEEE Secur. Priv. 5, 75\u201378 (2012)","journal-title":"IEEE Secur. Priv."},{"issue":"8","key":"21_CR33","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TSE.2007.70712","volume":"33","author":"R Telang","year":"2007","unstructured":"Telang, R., Wattal, S.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Trans. Soft. Eng. 33(8), 544\u2013557 (2007)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Verendel, V.: Quantified security is a weak hypothesis: a critical survey of results and assumptions. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. ACM (2009)","DOI":"10.1145\/1719030.1719036"},{"key":"21_CR35","unstructured":"Yan, G., Kucuk, Y., Slocum, M., Last, D.C.: A Bayesian cogntive approach to quantifying software exploitability based on reachability testing (extended version). \n                      http:\/\/www.cs.binghamton.edu\/~ghyan\/papers\/extended-isc16.pdf"},{"issue":"1","key":"21_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11219-016-9306-x","volume":"24","author":"A Younis","year":"2016","unstructured":"Younis, A., Malaiya, Y.K., Ray, I.: Assessing vulnerability exploitability risk using software properties. Soft. Qual. J 24(1), 1\u201344 (2016)","journal-title":"Soft. Qual. J"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R., Garneau, C.: An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM (2015)","DOI":"10.1145\/2746194.2746203"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:08:11Z","timestamp":1558314491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"26 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}