{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T01:02:24Z","timestamp":1745715744251,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icse.2013.6606625","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:03Z","timestamp":1380638283000},"page":"792-801","source":"Crossref","is-referenced-by-count":33,"title":["Program transformations to fix C integers"],"prefix":"10.1109","author":[{"given":"Zack","family":"Coker","sequence":"first","affiliation":[]},{"given":"Munawar","family":"Hafiz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Basic integer overflows","volume":"60","author":"blexim","year":"2002","journal-title":"Phrack"},{"journal-title":"Integer handling with the C++ SafeInt class","year":"2004","author":"leblanc","key":"35"},{"key":"17","article-title":"OpenRefactory\/C: An infrastructure for developing program transformations for C programs","author":"hafiz","year":"2012","journal-title":"OOPSLA '12 Companion to the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems Languages and Applications"},{"journal-title":"CLN Class library for numbers","year":"0","key":"36"},{"year":"0","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_5"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227190"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209970"},{"year":"0","key":"16"},{"year":"0","key":"39"},{"journal-title":"CERT C Secure Coding Standard","year":"2008","author":"seacord","key":"13"},{"year":"0","key":"14"},{"journal-title":"GMP Gnu Multiple Precision Arithmetic Library","year":"0","key":"37"},{"journal-title":"Security on Demand","year":"2010","author":"hafiz","key":"11"},{"key":"38","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/ISSRE.2010.29","article-title":"As-If Infinitely Ranged integer model","author":"dannenberg","year":"2010","journal-title":"2010 IEEE 21st International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-00199-4_7","article-title":"Systematically eradicating data injection attacks using security-oriented program transformations","author":"hafiz","year":"2009","journal-title":"Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS-09)"},{"journal-title":"CVE-2008-1801","year":"2008","key":"21"},{"year":"0","key":"20"},{"journal-title":"Integerlib Library","year":"0","key":"22"},{"journal-title":"CVE-2011-3026","year":"2012","key":"23"},{"journal-title":"Photran-An Integrated Development Environment and Refactoring Tool for Fortran","year":"0","key":"24"},{"journal-title":"CVE-2010-1516","year":"2010","key":"25"},{"journal-title":"CVE-2012-2110","year":"2012","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","article-title":"A tool for checking ansi-c programs","volume":"2988","author":"clarke","year":"2004","journal-title":"ser Lecture Notes in Computer Science"},{"journal-title":"PREfast Analysis Tool","year":"0","key":"28"},{"key":"29","article-title":"ARCHERR: Runtime environment driven program safety","author":"iyer","year":"2004","journal-title":"ESORICS European Symposium on Research in Computer Security LNCS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004368"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_1"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"10"},{"year":"0","key":"1"},{"key":"30","article-title":"Flowinsensitive static analysis for detecting integer anomalies in programs","author":"sarkar","year":"2007","journal-title":"SE'07 Proceedings of the 25th Conference on IASTED International Multi-Conference Anaheim"},{"key":"7","article-title":"RICH: Automatically protecting against integer-based vulnerabilities","author":"brumley","year":"2007","journal-title":"NDSS the Internet Society"},{"key":"6","article-title":"Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution","author":"wang","year":"2009","journal-title":"NDSS"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.109"},{"key":"5","article-title":"UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries","author":"wojtczuk","year":"2005","journal-title":"Proc Chaos Communication Congress"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"4","article-title":"Dynamic test generation to find integer bugs in x86 binary Linux programs","author":"david molnar","year":"2009","journal-title":"Proceedings of the 18th USENIX Security Symposium"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227142"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.77"}],"event":{"name":"2013 35th International Conference on Software Engineering (ICSE)","start":{"date-parts":[[2013,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,26]]}},"container-title":["2013 35th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596173\/6606539\/06606625.pdf?arnumber=6606625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:55:48Z","timestamp":1498071348000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icse.2013.6606625","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}