{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:32Z","timestamp":1775054432202,"version":"3.50.1"},"reference-count":19,"publisher":"Pleiades Publishing Ltd","issue":"6","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1134\/s0361768815060055","type":"journal-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T22:51:27Z","timestamp":1447455087000},"page":"373-380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Automated exploit generation for stack buffer overflow vulnerabilities"],"prefix":"10.1134","volume":"41","author":[{"given":"V. A.","family":"Padaryan","sequence":"first","affiliation":[]},{"given":"V. V.","family":"Kaushan","sequence":"additional","affiliation":[]},{"given":"A. N.","family":"Fedotov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"6282_CR1","first-page":"131","volume":"22","author":"A.Yu. Tikhonov","year":"2012","unstructured":"Tikhonov, A.Yu. and Avetisyan, A.I., A combined (static and dynamic) analysis of binary code, Tr. Inst. Sist. Program. Ross. Akad. Nauk, 2012, vol. 22, pp. 131\u2013152.","journal-title":"Tr. Inst. Sist. Program. Ross. Akad. Nauk"},{"key":"6282_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C., Symbolic execution and program testing, Commun. ACM, 1976, no. 19, pp. 385\u2013394.","journal-title":"Commun. ACM"},{"key":"6282_CR3","volume-title":"Crash Analysis with BitBlaze","author":"C. Miller","year":"2010","unstructured":"Miller, C., Caballero, J., Johnson, N.M., Kang, M.G., McCamant, S., Poosankam, P., and Song, D., Crash Analysis with BitBlaze, BlackHat, 2010."},{"key":"6282_CR4","volume-title":"IEEE Symposium on Security and Privacy","author":"S.K. Cha","year":"2012","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., and Brumley, D., Unleashing MAYHEM on binary code, in IEEE Symposium on Security and Privacy, 2012."},{"key":"6282_CR5","first-page":"1083","volume-title":"36th Int. Conf. on Software Engineering","author":"T. Avgerinos","year":"2014","unstructured":"Avgerinos, T., Rebert, A., Cha, S.K., and Brumley, D., Enhancing symbolic execution with veritesting, in 36th Int. Conf. on Software Engineering, 2014, pp. 1083\u20131094."},{"issue":"1","key":"6282_CR6","first-page":"251","volume":"26","author":"V.A. Padaryan","year":"2014","unstructured":"Padaryan, V.A., Getman, A.I., Solovyev, M.A., Bakulin, M.A., Borzilov, A.I., Kaushan, V.V., Ledovskikh, I.N., Markin, Yu.V., and Panasenko, S.S., Methods and software tools supporting a combined analysis of binary code, Tr. Inst. Sist. Program. Ross. Akad. Nauk, 2014, vol. 26, no. 1, pp. 251\u2013276.","journal-title":"Tr. Inst. Sist. Program. Ross. Akad. Nauk"},{"key":"6282_CR7","volume-title":"Materialy konferentsii RusKripto'2013","author":"P.M. Dovgalyuk","year":"2013","unstructured":"Dovgalyuk, P.M., Fursova, N.I., and Dmitriev, D.S., Prospects of using the deterministic replay of the virtual machine operation for ensuring computer security, in Materialy konferentsii RusKripto'2013 (Proc. of the Conf. RusCrpto'2013), Moscow, 2013."},{"issue":"1","key":"6282_CR8","first-page":"277","volume":"26","author":"P.M. Dovgalyuk","year":"2014","unstructured":"Dovgalyuk, P.M., Makarov, V.A., Padaryan, V.A., Romaneev, M.S., and Fursova N.I., Application of software emulators for the analysis of binary codes, Tr. Inst. Sist. Program. Ross. Akad. Nauk, 2014, vol. 26, no. 1, pp. 277\u2013296.","journal-title":"Tr. Inst. Sist. Program. Ross. Akad. Nauk"},{"key":"6282_CR9","first-page":"66","volume":"3","author":"A.Yu. Tikhonov","year":"2008","unstructured":"Tikhonov, A.Yu., Avetisyan, A.I., and Padaryan, V.A., A technique for extracting the algorithm from binary code based on dynamic analysis, Inf. Security Probl. Comput. Syst., 2008, no. 3, pp. 66\u201371.","journal-title":"Inf. Security Probl. Comput. Syst."},{"issue":"3","key":"6282_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1134\/S0361768811030030","volume":"37","author":"V.A. Padaryan","year":"2011","unstructured":"Padaryan, V.A., Solovyev, M.A., and Kononov, A.I., Simulation of operational semantics of machine instructions, Program. Comput. Software, 2011, vol. 37, no. 3, pp. 161\u2013170.","journal-title":"Program. Comput. Software"},{"key":"6282_CR11","volume-title":"Proc. of the USENIX Security Symposium","author":"E.J. Schwartz","year":"2011","unstructured":"Schwartz, E.J., Avgerinos, T., and Brumley, D., Q: Exploit hardening made easy, in Proc. of the USENIX Security Symposium, 2011."},{"key":"6282_CR12","first-page":"131","volume-title":"Materialy XVIII Obshcherossiisckoi nauchno-tekhnicheskoi konferentsii \u201cMetody n tekhnicheskie sredstva obespecheniya bezopasnosti informatsii\u201d","author":"A.Yu. Tikhonov","year":"2009","unstructured":"Tikhonov, A.Yu. and Padaryan, V.A., Application of program slicing for the analysis of binary code represented by execution traces, Materialy XVIII Obshcherossiisckoi nauchno-tekhnicheskoi konferentsii \u201cMetody n tekhnicheskie sredstva obespecheniya bezopasnosti informatsii\u201d (Proc. of the All-Russia Conf. on Methods and Tools for Data Security), 2009, p. 131."},{"key":"6282_CR13","volume-title":"Proc. of PDPAR'03","author":"S. Ranise","year":"2003","unstructured":"Ranise, S. and Tinelli, C., The SMT-LIB format: An initial proposal, Proc. of PDPAR'03, 2003."},{"issue":"2","key":"6282_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2560217.2560219","volume":"57","author":"T. Avgerinos","year":"2014","unstructured":"Avgerinos, T., Cha, S.K., Rebert, A., Schwartz, E.J., Woo, M., and Brumley, D., AEG: Automatic exploit generation, Commun. ACM, 2014, vol. 57, no. 2, pp. 74\u201384.","journal-title":"Commun. ACM"},{"key":"6282_CR15","volume-title":"Proc. of the ACM Conf. on Computer and Communications Security","author":"J. Caballero","year":"2010","unstructured":"Caballero, J., Poosankam, P., McCamant, S., Babic, D., and Song, D., Input generation via decomposition and re-stitching: Finding bugs in malware, in Proc. of the ACM Conf. on Computer and Communications Security, Chicago, 2010."},{"key":"6282_CR16","volume-title":"Proc. of the Int. Conf. on Architectural Support for Programming Languages and Operating Systems","author":"L. Martignoni","year":"2012","unstructured":"Martignoni, L., McCamant, S., Poosankam, P., Song, D., and Maniatis, P., Path-exploration lifting: Hi-fi tests for lo-fi emulators, in Proc. of the Int. Conf. on Architectural Support for Programming Languages and Operating Systems, London, 2012."},{"key":"6282_CR17","first-page":"265","volume-title":"Proc. of the Int. Conf. on Architectural Support for Programming Languages and Operating Systems","author":"V. Chipounov","year":"2011","unstructured":"Chipounov, V., Kuznetsov, V., and Candea, G., S2E: A platform for in-vivo multi-path analysis of software systems, in Proc. of the Int. Conf. on Architectural Support for Programming Languages and Operating Systems, 2011, pp. 265\u2013278."},{"key":"6282_CR18","volume-title":"Proc. of the Network and Distributed System Security Symposium","author":"P. Godefroid","year":"2008","unstructured":"Godefroid, P., Levin, M., and Molnar, D., Automated whitebox fuzz testing, in Proc. of the Network and Distributed System Security Symposium, 2008."},{"key":"6282_CR19","first-page":"55","volume":"21","author":"I.K. Isaev","year":"2011","unstructured":"Isaev, I.K., Sidorov, D.V., Gerasimov, A.Yu., and Ermakov, M.K. Avalanche: Application of dynamic analysis for the automatic detection of bugs in programs that use network sockets, Tr. Inst. Sist. Program. Ross. Akad. Nauk, 2011, vol. 21, pp. 55\u201370.","journal-title":"Tr. Inst. Sist. Program. Ross. Akad. Nauk"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815060055.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768815060055","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815060055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815060055.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:18:02Z","timestamp":1775009882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768815060055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["6282"],"URL":"https:\/\/doi.org\/10.1134\/s0361768815060055","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11]]},"assertion":[{"value":"15 December 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}