{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:36Z","timestamp":1740098976839,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319698106"},{"type":"electronic","value":"9783319698113"}],"license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69811-3_40","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:08:02Z","timestamp":1509494882000},"page":"439-449","source":"Crossref","is-referenced-by-count":1,"title":["Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing Test"],"prefix":"10.1007","author":[{"given":"Baojiang","family":"Cui","sequence":"first","affiliation":[]},{"given":"Xiangqian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tianxin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"40_CR1","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional, Upper saddle River (2007)"},{"key":"40_CR2","unstructured":"Iozzo, V.: Knowledge fuzz testing. In: Proceedings of the Black Hat (2010)"},{"key":"40_CR3","unstructured":"Zhi-Yonga, W.U., Xia, J.J., Sun, L.C., et al.: Survey of multi-dimensional fuzzing technology. Appl. Res. Comput. (2010)"},{"key":"40_CR4","unstructured":"https:\/\/www.corelan.be\/index.php\/2010\/10\/20\/in-memory-fuzzing\/"},{"key":"40_CR5","unstructured":"Wei-Ming, L.I., Jun-Qing, Y.U., Shao-Bo, A.I.: PyFuzzer: automatic in-memory fuzz testing method. J. Commun. (2013)"},{"key":"40_CR6","unstructured":"Zhou, C.K.: Research on Vulnerability Mining Based on Improved Memory Fuzzy Test. Huazhong University of Science and Technology (2015)"},{"key":"40_CR7","first-page":"7","volume":"56","author":"B Cui","year":"2016","unstructured":"Cui, B., Wang, F., Guo, T., et al.: Research of taint-analysis based API in-memory fuzzing tests. J. Tsinghua Univ. 56, 7\u201313 (2016)","journal-title":"J. Tsinghua Univ."},{"issue":"7","key":"40_CR8","first-page":"8","volume":"36","author":"S Tian","year":"2009","unstructured":"Tian, S.: Survey of static analysis methods for binary code vulnerability. Comput. Sci. 36(7), 8\u201314 (2009)","journal-title":"Comput. Sci."},{"key":"40_CR9","unstructured":"http:\/\/www.ibm.com\/developerworks\/cn\/security\/buffer-defend\/index.html"},{"issue":"8","key":"40_CR10","first-page":"140","volume":"34","author":"HU Chao-Jian","year":"2013","unstructured":"Chao-Jian, H.U., Xue, Y.B., Liang, Z., et al.: Backdoor detection in embedded system firmware without file system. J. Commun. 34(8), 140\u2013145 (2013)","journal-title":"J. Commun."},{"key":"40_CR11","unstructured":"Yan, S., Wang, R., Hauser, C., et al.: Firmalice - automatic detection of authentication bypass vulnerabilities in binary firmware. In: Network and Distributed System Security Symposium (2015)"},{"issue":"12","key":"40_CR12","first-page":"34","volume":"21","author":"RP Zhou","year":"2004","unstructured":"Zhou, R.P., Lei, T., Zhu, H.: Applied study of library functions recognition in decompiling. Appl. Res. Comput. 21(12), 34\u201336 (2004)","journal-title":"Appl. Res. Comput."},{"issue":"18","key":"40_CR13","first-page":"3968","volume":"31","author":"F Huang","year":"2010","unstructured":"Huang, F., Yin, Q., Jiang, L.H., et al.: Technical study of ARM static library identification. Comput. Eng. Des. 31(18), 3968\u20133971 (2010)","journal-title":"Comput. Eng. Des."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69811-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:25:04Z","timestamp":1509495904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69811-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"ISBN":["9783319698106","9783319698113"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69811-3_40","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,11,2]]}}}