{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:11:21Z","timestamp":1725707481461},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"US National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["CNS-2153474"],"award-info":[{"award-number":["CNS-2153474"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,22]]},"DOI":"10.1109\/icsrs59833.2023.10381130","type":"proceedings-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T14:33:05Z","timestamp":1704724385000},"page":"282-289","source":"Crossref","is-referenced-by-count":0,"title":["Targeted Symbolic Execution for UAF Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computing, DePaul University,Chicago,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859035"},{"key":"ref3","article-title":"Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2009. The Internet Society","author":"Wang","year":"2009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"volume-title":"2023 CWE Top 25 Most Dangerous Software Weaknesses","year":"2023","key":"ref5"},{"volume-title":"A use-after-free vulnerability in the linux kernels netfilter","key":"ref6"},{"volume-title":"Use after free in mediastream in google chrome","key":"ref7"},{"volume-title":"Gpac through 2.2.1 has a use-after-free vulnerability","key":"ref8"},{"volume-title":"Freerdp is subject to a use-after-free issue","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380386"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"ref14","first-page":"283","article-title":"Aeg: Automatic exploit generation","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Avgerinos","year":"2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180251"},{"key":"ref16","first-page":"199","article-title":"Sys: A Static\/Symbolic tool for finding good bugs in good (browser) code","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Brown","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850330"},{"key":"ref18","first-page":"49","article-title":"{Under-Constrained} symbolic execution: Correctness checking for real code","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Ramos","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409734"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167289"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"ref23","first-page":"781","article-title":"FUZE: Towards facilitating exploit generation for kernel Use-After-Free vulnerabilities","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wu"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642951"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336769"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3015135.3015137"},{"key":"ref29","first-page":"47","article-title":"Binary-level directed fuzzing for Use-After-Free vulnerabilities","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Nguyen"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23190"},{"key":"ref31","first-page":"2453","article-title":"Preventing Use-After-Free attacks with fast forward allocation","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Wickman","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243826"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465771"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3457682.3457707"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3529836.3529926"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23052"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458717"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS56243.2022.10067783"},{"volume-title":"The LLVM Compiler Infrastructure","year":"2022","key":"ref39"},{"key":"ref40","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI08","author":"Cadar"},{"volume-title":"CVE - MITRE","year":"2023","key":"ref41"},{"volume-title":"BugZilla","year":"2023","key":"ref42"}],"event":{"name":"2023 7th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2023,11,22]]},"location":"Bologna, Italy","end":{"date-parts":[[2023,11,24]]}},"container-title":["2023 7th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10380806\/10380972\/10381130.pdf?arnumber=10381130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T23:57:47Z","timestamp":1706054267000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10381130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icsrs59833.2023.10381130","relation":{},"subject":[],"published":{"date-parts":[[2023,11,22]]}}}