{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:30:54Z","timestamp":1725622254815},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236013"},{"type":"electronic","value":"9783642236020"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23602-0_9","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T04:31:35Z","timestamp":1318912295000},"page":"99-109","source":"Crossref","is-referenced-by-count":3,"title":["RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow"],"prefix":"10.1007","author":[{"given":"Yong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Liwen","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Wang, T.L., Wei, T., Lin, Z.Q., Zou, W.: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In: Proceedings of the 16th Network and Distributed System Security Symposium, San Diego, CA, pp. 1\u201314 (2009)"},{"key":"9_CR2","first-page":"219","volume":"25","author":"S.R. Zhang","year":"2009","unstructured":"Zhang, S.R., Xu, L., Xu, B.W.: Method of Integer Overflow Detection to Avoid Buffer Overflow. Journal of Southeast University (English Edition)\u00a025, 219\u2013223 (2009)","journal-title":"Journal of Southeast University (English Edition)"},{"key":"9_CR3","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), San Diego, CA (2008)"},{"key":"9_CR4","unstructured":"Brumley, D., Chiueh, T.C., Johnson, R., Lin, H., Song, D.: Rich: Automatically Protecting Against Integer-based Vulnerabilities. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium, NDSS (2007)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: Exe: Automatically Generating Inputs of Death. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 322\u2013335 (2006)","DOI":"10.1145\/1180405.1180445"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Dor, N., Rodeh, M., Sagiv, M.: CSSV: Towards a Realistic Tool for Statically Detecting all Buffer Overflows. In: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, San Diego, pp. 155\u2013167 (2003)","DOI":"10.1145\/781131.781149"},{"key":"9_CR7","unstructured":"Haugh, E., Bishop, M.: Testing C Programs for Buffer overflow Vulnerabilities. In: Proceedings of the10th Network and Distributed System Security Symposium, NDSS SanDiego, pp. 123\u2013130 (2003)"},{"key":"9_CR8","unstructured":"Wilander, J., Kamkar, M.: A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. In: Proceedings of the 10th Network and Distributed System Security Symposium, NDSS 2003, SanDiego, pp. 149\u2013162 (2003)"},{"key":"9_CR9","first-page":"1","volume-title":"Buffer Overflow and Format String Overflow Vulnerabilities, Sofware-Practice and Experience","author":"K.S. Lhee","year":"2002","unstructured":"Lhee, K.S., Chapin, S.J.: Buffer Overflow and Format String Overflow Vulnerabilities, Sofware-Practice and Experience, pp. 1\u201338. John Wiley & Sons, Chichester (2002)"},{"key":"9_CR10","first-page":"378","volume-title":"Integer squarers with overflow detection, Computers and Electrical Engineering","author":"M. Gok","year":"2008","unstructured":"Gok, M.: Integer squarers with overflow detection, Computers and Electrical Engineering, pp. 378\u2013391. Elsevier, Amsterdam (2008)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/TC.2006.126","volume":"55","author":"M. Gok","year":"2006","unstructured":"Gok, M.: Integer Multipliers with Overflow Detection. IEEE Transactions on Computers\u00a055, 1062\u20131066 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"9_CR12","unstructured":"Godefroid, P., Levin, M., Molnar, D.: Automated whitebox fuzz testing. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA (2008)"},{"key":"9_CR13","volume-title":"Proceedings of the 10th USENIX Security Symposium","author":"C. Cowan","year":"2001","unstructured":"Cowan, C., Barringer, M., Beattie, S., Kroah-Hartman, G.: FormatGuard: Automatic Protection From printf Format String Vulnerabilities. In: Proceedings of the 10th USENIX Security Symposium. USENIX Association, Sydney (2001)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-642-13318-3_71","volume-title":"Advances in Neural Networks - ISNN 2010","author":"Y. Wang","year":"2010","unstructured":"Wang, Y., Gu, D.W., Wen, M., Xu, J.P., Li, H.M.: Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network. In: Zhang, L., Lu, B.-L., Kwok, J. (eds.) ISNN 2010. LNCS, vol.\u00a06064, pp. 576\u2013585. Springer, Heidelberg (2010)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-642-13318-3_69","volume-title":"Advances in Neural Networks - ISNN 2010","author":"Y. Wang","year":"2010","unstructured":"Wang, Y., Gu, D.W., Wen, M., Li, H.M., Xu, J.P.: Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network. In: Zhang, L., Lu, B.-L., Kwok, J. (eds.) ISNN 2010. LNCS, vol.\u00a06064, pp. 556\u2013565. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Forensics in Telecommunications, Information, and Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23602-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T00:02:03Z","timestamp":1555113723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23602-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236013","9783642236020"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23602-0_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}