{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:30Z","timestamp":1725496350596},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,17]]},"DOI":"10.1109\/svcc61185.2024.10637307","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:53:34Z","timestamp":1724349214000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["PoE: A Domain-Specific Language for Exploitation"],"prefix":"10.1109","author":[{"given":"Jung Hyun","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Steve","family":"Gustaman","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST"}]}],"member":"263","reference":[{"key":"ref1","article-title":"pwnable.kr"},{"key":"ref2","article-title":"Seccon ctf 2018"},{"key":"ref3","first-page":"283","article-title":"AEG: Automatic exploit generation","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Avgerinos"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"ref5","article-title":"Palindrome"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"ref7","article-title":"Proof of vulnerability (pov) in cfe"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3147704.3147728"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11030-7_20"},{"key":"ref10","article-title":"Cyber grand challenge (cgc)"},{"key":"ref11","article-title":"pwntools \u2013 ctf toolkit"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.80"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref18","article-title":"Exploits + shellcode + ghdb"},{"key":"ref19","article-title":"Metasploit"},{"key":"ref20","article-title":"Cucumber and gherkin"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11788713_25"},{"article-title":"Git-based CTF: A simple and effective approach to organizing in-course attack-and-defense security competition","volume-title":"Proceedings of the USENIX Workshop on Advances in Security Education","author":"Wi","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950357"}],"event":{"name":"2024 Silicon Valley Cybersecurity Conference (SVCC)","start":{"date-parts":[[2024,6,17]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,6,19]]}},"container-title":["2024 Silicon Valley Cybersecurity Conference (SVCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637325\/10637304\/10637307.pdf?arnumber=10637307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:53:56Z","timestamp":1725440036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,17]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/svcc61185.2024.10637307","relation":{},"subject":[],"published":{"date-parts":[[2024,6,17]]}}}