{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:30:37Z","timestamp":1757543437368,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319992280"},{"type":"electronic","value":"9783319992297"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99229-7_10","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T10:32:58Z","timestamp":1534761178000},"page":"99-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Constraint-Based Testing for Buffer Overflows"],"prefix":"10.1007","author":[{"given":"Loui","family":"Al Sardy","sequence":"first","affiliation":[]},{"given":"Francesca","family":"Saglietti","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Sonnenberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-66284-8_10","volume-title":"Computer Safety, Reliability, and Security","author":"L Al Sardy","year":"2017","unstructured":"Al Sardy, L., Tang, T., Spisl\u00e4nder, M., Saglietti, F.: Analysis of potential code vulnerabilities involving overlapping instructions. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2017. LNCS, vol. 10489, pp. 103\u2013113. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66284-8_10"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-08509-8_3","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Andriesse","year":"2014","unstructured":"Andriesse, D., Bos, H.: Instruction-level steganography for covert trigger-based malware. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 41\u201350. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08509-8_3"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Chess, B., McGraw, G.: Static analysis for security. In: IEEE Security & Privacy, vol. 2, pp. 76\u201379. IEEE (2004). https:\/\/doi.org\/10.1109\/msp.2004.111","DOI":"10.1109\/msp.2004.111"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Del Grosso, C., Antoniol, G., Merlo, E., Galinier, P.: Detecting buffer overflow via automatic test input data generation. In: Computers & Operations Research, vol. 35, pp. 3125\u20133143. Elsevier (2008)","DOI":"10.1016\/j.cor.2007.01.013"},{"key":"10_CR5","unstructured":"Department of Homeland Security (U.S.): Annual Vulnerability Coordination Report. National Cybersecurity and Communications Integration Center\/Industrial Control Systems Cyber Emergency Response Team (2016)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-47764-0_12","volume-title":"Static Analysis","author":"N Dor","year":"2001","unstructured":"Dor, N., Rodeh, M., Sagiv, M.: Cleanness checking of string manipulations in C programs via integer analysis. In: Cousot, P. (ed.) SAS 2001. LNCS, vol. 2126, pp. 194\u2013212. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-47764-0_12"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Dor, N., Rodeh, M., Sagiv, M.: CSSV: towards a realistic tool for statically detecting all buffer overflows. In: Programming Language Design and Implementation (PLDI), vol. 38, pp. 155\u2013167. ACM (2003). https:\/\/doi.org\/10.1145\/780822.781149","DOI":"10.1145\/780822.781149"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.976940","volume":"19","author":"D Evans","year":"2002","unstructured":"Evans, D., Larochelle, D.: Improving security using extensible lightweight static analysis. IEEE Softw. 19, 42\u201351 (2002). https:\/\/doi.org\/10.1109\/52.976940","journal-title":"IEEE Softw."},{"key":"10_CR9","volume-title":"Buffer Overflow Attacks: Detect, Exploit","author":"JC Foster","year":"2005","unstructured":"Foster, J.C., Osipov, V., Bhalla, N., Heinen, N.: Buffer Overflow Attacks: Detect, Exploit, Prevent. Syngress, Rockland (2005)"},{"key":"10_CR10","unstructured":"Haugh, E., Bishop, M.: Testing C programs for buffer overflow vulnerabilities. In: Network and Distributed System Security Symposium (2003)"},{"key":"10_CR11","unstructured":"International Organization for Standardization (ISO): Programming Languages \u2500 C, International Standard ISO\/ IEC 9899:TC3 (E). ISO (2007). http:\/\/www.open-std.org"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-319-45477-1_19","volume-title":"Computer Safety, Reliability, and Security","author":"C J\u00e4mthagen","year":"2016","unstructured":"J\u00e4mthagen, C., Lantz, P., Hell, M.: Exploiting trust in deterministic builds. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 238\u2013249. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45477-1_19"},{"key":"10_CR13","unstructured":"Larochelle, D., Evans D.: Statically detecting likely buffer overflow vulnerabilities. In: 10th Conference on USENIX Security Symposium, vol. 10, pp. 177\u2013190. ACM (2001)"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Le. W., Soffa, M.L.: Marple: a Demand-driven path-sensitive buffer overflow detector. In: 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM (2008). https:\/\/doi.org\/10.1145\/1453101.1453137","DOI":"10.1145\/1453101.1453137"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Lhee, K., Chapin, S.: Buffer overflow and format string overflow vulnerabilities. J. Softw. Pract. Exp. 33, 423\u2013460 (2003). https:\/\/doi.org\/10.1002\/spe.515","DOI":"10.1002\/spe.515"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/11875567_32","volume-title":"Computer Safety, Reliability, and Security","author":"N Oster","year":"2006","unstructured":"Oster, N., Saglietti, F.: Automatic test data generation by multi-objective optimisation. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 426\u2013438. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11875567_32"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Padmanabhuni, B.M., Tan, H.B.K.: Auditing buffer overflow vulnerabilities using hybrid static\u2013dynamic analysis. In: 38th Annual International Computers, Software and Applications Conference, vol. 10, pp. 54\u201361 (2014). https:\/\/doi.org\/10.1109\/compsac.2014.62","DOI":"10.1109\/compsac.2014.62"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-319-45480-1_18","volume-title":"Computer Safety, Reliability, and Security","author":"F Saglietti","year":"2016","unstructured":"Saglietti, F., Meitner, M., von Wardenburg, L., Richthammer, V.: Analysis of informed attacks and appropriate countermeasures for cyber-physical systems. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 222\u2013233. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45480-1_18"},{"key":"10_CR19","unstructured":"Schneider Electric Software Security Response Center: InduSoft Web Studio and InTouch Machine Edition \u2013 Remote Code Execution Vulnerability, Security Bulletin LFSEC00000125 (2018)"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Shahriar, H., Zulkernine, M.: Classification of static analysis-based buffer overflow detectors. In: 4th International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C). IEEE (2010). https:\/\/doi.org\/10.1109\/ssiri-c.2010.28","DOI":"10.1109\/ssiri-c.2010.28"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Shahriar, H., Zulkernine, M.: Mutation-based testing of buffer overflow vulnerabilities. In: Computer Software and Applications (COMPSAC 2008), pp. 979\u2013984. IEEE (2008)","DOI":"10.1109\/COMPSAC.2008.123"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Tracey, N., Clark, J., Mander, K., McDermid, J.: An automated framework for structural test-data generation. In: 13th IEEE International Conference on Automated Software Engineering, pp. 285\u2013288. IEEE (1998). https:\/\/doi.org\/10.1109\/ase.1998.732680","DOI":"10.1109\/ase.1998.732680"},{"key":"10_CR23","unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Network and Distributed System Security Symposium (NDSS), pp. 3\u201317 (2000)"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Wegener, J., Baresel, A., Sthamer, H.: Evolutionary test environment for automatic structural testing. In: Information and Software Technology, vol. 43, pp. 841\u2013854. Elsevier (2001). https:\/\/doi.org\/10.1016\/s0950-5849(01)00190-2","DOI":"10.1016\/s0950-5849(01)00190-2"},{"key":"10_CR25","unstructured":"Weiser, M.: Program slicing. In: 5th International Conference on Software Engineering, pp. 439\u2013449. IEEE Press (1981)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99229-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T19:09:47Z","timestamp":1743880187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99229-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319992280","9783319992297"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99229-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"21 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"V\u00e4ster\u00e5s","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.es.mdh.se\/safecomp2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}