{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:31:12Z","timestamp":1740101472353,"version":"3.37.3"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,23]]},"DOI":"10.1109\/icsrs56243.2022.10067783","type":"proceedings-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T19:48:19Z","timestamp":1679428099000},"page":"324-330","source":"Crossref","is-referenced-by-count":1,"title":["Runtime Recovery for Integer Overflows"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Huang","sequence":"first","affiliation":[{"name":"DePaul University,School of Computing,Chicago,USA"}]}],"member":"263","reference":[{"year":"2020","key":"ref1","article-title":"CWE Definitions"},{"year":"2020","key":"ref2","article-title":"Top 25 Most Dangerous Software Weaknesses"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946148"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227142"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694389"},{"article-title":"Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2009","author":"Wang","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494996"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465771"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535888"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714605"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115718"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606625"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.43"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232562"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.51"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/2.191981"},{"key":"ref19","first-page":"2381","article-title":"Undo workarounds for kernel bugs","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Talebi","year":"2021"},{"key":"ref20","article-title":"Undo for operators: Building an undoable e-mail store","volume-title":"2003 USENIX Annual Technical Conference (USENIX ATC 03)","author":"Brown","year":"2003"},{"key":"ref21","first-page":"21","article-title":"Enhancing server availability and security through failure-oblivious computing","volume-title":"OSDI\u201904: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation","author":"Rinard"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519083"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"ref25","first-page":"782","article-title":"Automatic recovery from runtime failures","volume-title":"Proceedings of the 2013 International Conference on Software Engineering","author":"Carzaniga"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3457682.3457707"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23052"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850330"},{"key":"ref29","first-page":"163","article-title":"Improving integer security for systems with KINT","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2012","author":"Wang"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227204"},{"issue":"49","key":"ref31","article-title":"Smashing the stack for fun and profit","volume":"7","author":"One","year":"1996","journal-title":"Phrack Magazine"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"article-title":"Integer overflow into information disclosure","year":"2021","author":"Wellons","key":"ref33"},{"year":"2022","key":"ref34","article-title":"The LLVM Compiler Infrastructure"},{"article-title":"BinPro: A Tool for Binary Source Code Provenance","year":"2017","author":"Miyani","key":"ref35"}],"event":{"name":"2022 6th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2022,11,23]]},"location":"Venice, Italy","end":{"date-parts":[[2022,11,25]]}},"container-title":["2022 6th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10067250\/10067256\/10067783.pdf?arnumber=10067783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:34:12Z","timestamp":1707831252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icsrs56243.2022.10067783","relation":{},"subject":[],"published":{"date-parts":[[2022,11,23]]}}}