{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:02:35Z","timestamp":1767927755310,"version":"3.49.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319663319","type":"print"},{"value":"9783319663326","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66332-6_2","type":"book-chapter","created":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:05Z","timestamp":1507708685000},"page":"26-47","source":"Crossref","is-referenced-by-count":20,"title":["Static Program Analysis as a Fuzzing Aid"],"prefix":"10.1007","author":[{"given":"Bhargava","family":"Shastry","sequence":"first","affiliation":[]},{"given":"Markus","family":"Leutner","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Fiebig","sequence":"additional","affiliation":[]},{"given":"Kashyap","family":"Thimmaraju","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Yamaguchi","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,12]]},"reference":[{"key":"2_CR1","volume-title":"Compilers, Principles, Techniques","author":"AV Aho","year":"1986","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers, Principles, Techniques. Addison-Wesley, Boston (1986)"},{"key":"2_CR2","unstructured":"Address Sanitizer. \nhttps:\/\/clang.llvm.org\/docs\/AddressSanitizer.html\n\n. Accessed 27 Mar 2017"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 1032\u20131043. ACM (2016)","DOI":"10.1145\/2976749.2978428"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 317\u2013329 (2007)","DOI":"10.1145\/1315245.1315286"},{"key":"2_CR5","unstructured":"Cert Secure Coding Standards. \nhttps:\/\/www.securecoding.cert.org\/confluence\/display\/seccode\/SEI+CERT+Coding+Standards\n\n. Accessed 01 June 2017"},{"key":"2_CR6","unstructured":"Clusterfuzzer: Heap-buffer-overflow in read. \nhttps:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=609042\n\n. Accessed 23 Mar 2017"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol specification extraction. In: Proceedings of the IEEE Security & Privacy, pp. 110\u2013125 (2009)","DOI":"10.1109\/SP.2009.14"},{"key":"2_CR8","unstructured":"Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: Proceedings of the USENIX Security Symposium, vol. 158 (2007)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Cui, W., Peinado, M., Chen, K., Wang, H.J., Irun-Briz, L.: Tupni: automatic reverse engineering of input formats. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 391\u2013402 (2008)","DOI":"10.1145\/1455770.1455820"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Engler, D., Chelf, B., Chou, A., Hallem, S.: Checking system rules using system-specific, programmer-written compiler extensions. In: Proceedings of the OSDI (2000)","DOI":"10.21236\/ADA419626"},{"key":"2_CR11","unstructured":"Foote, J.: The exploitable GDB plugin (2015). \nhttps:\/\/github.com\/jfoote\/exploitable\n\n. Accessed 23 Mar 2017"},{"issue":"8","key":"2_CR12","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/32.83912","volume":"17","author":"KB Gallagher","year":"1991","unstructured":"Gallagher, K.B., Lyle, J.R.: Using program slicing in software maintenance. IEEE Trans. Softw. Eng. 17(8), 751\u2013761 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1145\/1379022.1375607","volume":"43","author":"P Godefroid","year":"2008","unstructured":"Godefroid, P., Kiezun, A., Levin, M.Y.: Grammar-based whitebox fuzzing. ACM SIGPLAN Not. 43, 206\u2013215 (2008)","journal-title":"ACM SIGPLAN Not."},{"issue":"1","key":"2_CR14","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2090147.2094081","volume":"10","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: Sage: whitebox fuzzing for security testing. ACM Queue 10(1), 20 (2012)","journal-title":"ACM Queue"},{"key":"2_CR15","unstructured":"Google Inc.: Fuzzer test suite. \nhttps:\/\/github.com\/google\/fuzzer-test-suite\n\n. Accessed 23 Mar 2017"},{"key":"2_CR16","unstructured":"Holler, C., Herzig, K., Zeller, A.: Fuzzing with code fragments. In: Proceedings of the USENIX Security Symposium, pp. 445\u2013458 (2012)"},{"key":"2_CR17","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"JE Hopcroft","year":"2006","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages, and Computation, 3rd edn. Addison-Wesley, Reading (2006)","edition":"3"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Lam, M.S., Whaley, J., Livshits, V.B., Martin, M.C., Avots, D., Carbin, M., Unkel, C.: Context-sensitive program analysis as database queries. In: Proceedings of the ACM Symposium on Principles of Database Systems, pp. 1\u201312 (2005)","DOI":"10.1145\/1065167.1065169"},{"key":"2_CR19","unstructured":"Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic protocol format reverse engineering through context-aware monitored execution. In: Proceedings of Symposium on Network and Distributed System Security (NDSS), pp. 1\u201315 (2008)"},{"key":"2_CR20","unstructured":"LLVM Compiler Infrastructure: Clang static analyzer. \nhttp:\/\/clang-analyzer.llvm.org\/\n\n. Accessed 23 Mar 2017"},{"key":"2_CR21","unstructured":"LLVM Compiler Infrastructure: libFuzzer: a library for coverage-guided fuzz testing. \nhttp:\/\/llvm.org\/docs\/LibFuzzer.html\n\n. Accessed 23 Mar 2017"},{"issue":"12","key":"2_CR22","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"2_CR23","unstructured":"MITRE.org: CVE-2014-0160: The Heartbleed Bug. \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160\n\n. Accessed 23 Mar 2017"},{"key":"2_CR24","unstructured":"MITRE.org: CVE-2015-8317: Libxml2: several out of bounds reads. \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8317\n\n. Accessed 23 Mar 2017"},{"key":"2_CR25","unstructured":"MITRE.org: CVE-2016-5180: Project c-ares security advisory. \nhttps:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-5180\n\n. Accessed 23 Mar 2017"},{"key":"2_CR26","unstructured":"Molnar, D., Li, X.C., Wagner, D.: Dynamic test generation to find integer bugs in x86 binary Linux programs. In: Proceedings of the USENIX Security Symposium, vol. 9, pp. 67\u201382 (2009)"},{"key":"2_CR27","unstructured":"nDPI: Open and Extensible LGPLv3 Deep Packet Inspection Library. \nhttp:\/\/www.ntop.org\/products\/deep-packet-inspection\/ndpi\/\n\n. Accessed 23 Mar 2017"},{"key":"2_CR28","unstructured":"OpenRCE: Sulley. \nhttps:\/\/github.com\/OpenRCE\/sulley\n\n. Accessed 23 Mar 2017"},{"key":"2_CR29","unstructured":"Peach Fuzzer. \nhttp:\/\/www.peachfuzzer.com\/\n\n. Accessed 23 Mar 2017"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: Proceedings of the ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 49\u201361 (1995)","DOI":"10.1145\/199448.199462"},{"key":"2_CR31","unstructured":"Snort++ vulnerabilities found. \nhttp:\/\/blog.snort.org\/2017\/05\/snort-vulnerabilities-found.html\n\n. Accessed 05 June 2017"},{"key":"2_CR32","unstructured":"Wondracek, G., Comparetti, P.M., Kruegel, C., Kirda, E.: Automatic network protocol analysis. In: Proceedings of the Symposium on Network and Distributed System Security (NDSS) (2008)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Maier, A., Gascon, H., Rieck, K.: Automatic inference of search patterns for taint-style vulnerabilities. In: Proceedings of the IEEE Security & Privacy, pp. 797\u2013812 (2015)","DOI":"10.1109\/SP.2015.54"},{"key":"2_CR34","unstructured":"Zalewski, M.: American fuzzy lop. \nhttp:\/\/lcamtuf.coredump.cx\/afl\/\n\n. Accessed 23 Mar 2017"},{"key":"2_CR35","unstructured":"Zalewski, M.: afl-fuzz: making up grammar with a dictionary in hand (2015). \nhttps:\/\/lcamtuf.blogspot.de\/2015\/01\/afl-fuzz-making-up-grammar-with.html\n\n. Accessed 23 Mar 2017"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66332-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T07:58:56Z","timestamp":1507708736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66332-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663319","9783319663326"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66332-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}