{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:36:22Z","timestamp":1775054182178,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,1,30]],"date-time":"2014-01-30T00:00:00Z","timestamp":1391040000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11416-014-0203-1","type":"journal-article","created":{"date-parts":[[2014,1,29]],"date-time":"2014-01-29T21:31:22Z","timestamp":1391031082000},"page":"211-217","source":"Crossref","is-referenced-by-count":49,"title":["Statically detecting use after free on binary code"],"prefix":"10.1007","volume":"10","author":[{"given":"Josselin","family":"Feist","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Mounier","sequence":"additional","affiliation":[]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,30]]},"reference":[{"key":"203_CR1","unstructured":"Afek, J., Sharabani, A.: Dangling pointer: pointer. Smashing the pointer for fun and profit. Black Hat USA (2007)"},{"key":"203_CR2","first-page":"221","volume-title":"SAS \u201906: static analysis symposium, volume 4134 of LNCS","author":"G Balakrishnan","year":"2006","unstructured":"Balakrishnan, G., Reps, T.: Recency-abstraction for heap-allocated storage static analysis. In: Yi, K. (ed.) SAS \u201906: static analysis symposium, volume 4134 of LNCS, pp. 221\u2013239. Springer, Berlin (2006)"},{"key":"203_CR3","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Reps, T.: Wysinwyx: what you see is not what you execute. ACM Trans. Program. Lang. Syst. 32(6), 23:1\u201323:84 (2010)","DOI":"10.1145\/1749608.1749612"},{"key":"203_CR4","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duesterwald E (edi) CC, volume 2985 of LNCS, pp. 5\u201323. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"203_CR5","doi-asserted-by":"crossref","unstructured":"Bardin, S., Herrmann, P., Leroux, J., Ly, O., Tabary, R., Vincent, A.: The bincoa framework for binary code analysis. In: Proceedings of CAV\u201911, pp. 165\u2013170. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-22110-1_13"},{"key":"203_CR6","doi-asserted-by":"crossref","unstructured":"Brumley, D., Jager, I., Avgerinos, T., Schwartz, E.J.: Bap: a binary analysis platform. In: Proceedings of the 23rd International Conference on Computer Aided Verification. CAV\u201911, pp. 463\u2013469. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"203_CR7","doi-asserted-by":"crossref","unstructured":"Caballero, J., Grieco, G., Marron, M., Nappa, A.: Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities. In: Heimdahl, M.P.E., Su, Z. (eds.) ISSTA, pp. 133\u2013143. ACM (2012)","DOI":"10.1145\/2338965.2336769"},{"key":"203_CR8","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing mayhem on binary code. In: IEEE Symp. S&P, pp. 380\u2013394 (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"203_CR9","doi-asserted-by":"crossref","unstructured":"Cuoq, P., Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-c\u2014a software analysis perspective. In: SEFM, pp. 233\u2013247 (2012)","DOI":"10.1007\/978-3-642-33826-7_16"},{"key":"203_CR10","unstructured":"Dullien, Thomas, Porst, Sebastian: Reil: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest (2009)"},{"key":"203_CR11","unstructured":"Heelan, S.: Automatic generation of control flow hijacking exploits for software vulnerabilities. Master\u2019s thesis, University of Oxford, Computing Laboratory (2009)"},{"key":"203_CR12","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/S1571-0661(04)81042-9","volume":"89","author":"N Nethercote","year":"2003","unstructured":"Nethercote, N., Seward, J.: Valgrind: a program supervision framework. Electr. Notes Theor. Comput. Sci. 89, 44\u201366 (2003)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"203_CR13","doi-asserted-by":"crossref","unstructured":"Rawat, S., Mounier, L.: Finding buffer overflow inducing loops in binary executables. In: Proceedings of the Sixth International Conference on Software Security and Reliability, SERE 2012, pp. 177\u2013186. IEEE (2012)","DOI":"10.1109\/SERE.2012.30"},{"key":"203_CR14","unstructured":"Serebryany, K., Bruening, D., Potapenko, A., Vyukov, D.: Addresssanitizer: a fast address sanity checker. In: USENIX ATC 2012 (2012)"},{"key":"203_CR15","unstructured":"Vupen. Technical analysis of proftpd response pool use-after-free (cve-2011-4130). http:\/\/www.vupen.com\/blog\/20120110.Technical_Analysis_of_ProFTPD_Remote_Use_after_free_CVE-2011-4130_Part_I.php"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-014-0203-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-014-0203-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-014-0203-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T03:59:50Z","timestamp":1565150390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-014-0203-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,30]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["203"],"URL":"https:\/\/doi.org\/10.1007\/s11416-014-0203-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,30]]}}}