{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T05:05:06Z","timestamp":1734239106739,"version":"3.30.2"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003185","name":"Fraunhofer-Gesellschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1109\/mascots64422.2024.10786534","type":"proceedings-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:50:09Z","timestamp":1734115809000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing"],"prefix":"10.1109","author":[{"given":"Ramon","family":"Barakat","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Open Communication Systems FOKUS,Berlin,Germany"}]},{"given":"Silvan","family":"Josten","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Open Communication Systems FOKUS,Berlin,Germany"}]},{"given":"Martin A.","family":"Schneider","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Open Communication Systems FOKUS,Berlin,Germany"}]}],"member":"263","reference":[{"year":"2023","article-title":"2023 CWE Top. 10 KEV Weaknesses","key":"ref1"},{"year":"2023","article-title":"2023 CWE Top. 25 Most Dangerous Software Weaknesses","key":"ref2"},{"volume-title":"Secure Coding in C and C++.","year":"2013","author":"Seacord","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1186\/s42400-018-0002-y"},{"year":"2010","author":"Zalewski","article-title":"American fuzzy lop: a security-oriented fuzzer","key":"ref5"},{"year":"2013","article-title":"Libfuzzer - a library for coverage-guided fuzz testing","key":"ref6"},{"key":"ref7","first-page":"309","article-title":"Address-Sanitizer: A fast address sanity checker","volume-title":"2012 USENIX annual technical conference (USENIX ATC 12)","author":"Serebryany"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/52.976940"},{"key":"ref9","first-page":"327","article-title":"Archer: A tool for the verification of concurrent systems","volume-title":"Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE \u201806)","author":"Tripakis"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SECPRI.2001.924296"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1029894.1029911"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/S1571-0661(04)81042-9"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref14","first-page":"745","article-title":"{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Yun"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICST.2019.00015"},{"year":"2024","article-title":"Mjs: Restricted javascript engine","key":"ref16"}],"event":{"name":"2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","start":{"date-parts":[[2024,10,21]]},"location":"Krakow, Poland","end":{"date-parts":[[2024,10,23]]}},"container-title":["2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10786488\/10786336\/10786534.pdf?arnumber=10786534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:44:18Z","timestamp":1734158658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10786534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/mascots64422.2024.10786534","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}