{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:11:13Z","timestamp":1773148273398,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,25]]},"DOI":"10.1145\/1068009.1068185","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"1037-1043","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Improving network applications security"],"prefix":"10.1145","author":[{"given":"Concettina","family":"Del Grosso","sequence":"first","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"given":"Philippe","family":"Galinier","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada"}]},{"given":"Ettore","family":"Merlo","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada"}]}],"member":"320","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Beetlesoft RatScan. http:\/\/www.beetlesoft.com.  Beetlesoft RatScan. http:\/\/www.beetlesoft.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Secure software solutions rats the rough auditing tool for security. http:\/\/www.securesw.com\/rats\/.  Secure software solutions rats the rough auditing tool for security. http:\/\/www.securesw.com\/rats\/."},{"key":"e_1_3_2_1_3_1","volume-title":"CASCON","author":"Antoniol G.","year":"1999","unstructured":"G. Antoniol and E. Merlo . A static measure of a subset of intra-procedural data flow testing coverage based on node coverage . In CASCON , October 1999 . G. Antoniol and E. Merlo. A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. In CASCON, October 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.78"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943588"},{"key":"e_1_3_2_1_6_1","volume-title":"Student Paper Proceedings of the International Symposium of Software Reliability Engineering (ISSRE), St","author":"Del Grosso C.","year":"2004","unstructured":"C. Del Grosso , G. Antoniol , and M. Di Penta . An evolutionary testing approach to detect buffer overflow . In Student Paper Proceedings of the International Symposium of Software Reliability Engineering (ISSRE), St . Malo, France , Nov 2004 . C. Del Grosso, G. Antoniol, and M. Di Penta. An evolutionary testing approach to detect buffer overflow. In Student Paper Proceedings of the International Symposium of Software Reliability Engineering (ISSRE), St. Malo, France, Nov 2004."},{"key":"e_1_3_2_1_7_1","first-page":"77","volume-title":"International Symposium on Software Reliability Engineering (student paper)","author":"Del Grosso C.","year":"2004","unstructured":"C. Del Grosso , M. Di Penta , and G. Antoniol . An evolutionary testing approach to detect buffer overflows . In International Symposium on Software Reliability Engineering (student paper) , pages 77 -- 78 , St Malo, Bretagne, France, November, 2-5 2004 . C. Del Grosso, M. Di Penta, and G. Antoniol. An evolutionary testing approach to detect buffer overflows. In International Symposium on Software Reliability Engineering (student paper), pages 77--78, St Malo, Bretagne, France, November, 2-5 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg D. E.","year":"1989","unstructured":"D. E. Goldberg . Genetic Algorithms in Search, Optimization and Machine Learning . Addison-Wesley Pub Co , Jan 1989 . D. E. Goldberg. Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Pub Co, Jan 1989."},{"key":"e_1_3_2_1_9_1","volume-title":"In Proceedings of the Winter USENIX Conference","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast detection of memory leaks and access errors . In In Proceedings of the Winter USENIX Conference , Washington, DC, USA , Aug 1992 . R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In In Proceedings of the Winter USENIX Conference, Washington, DC, USA, Aug 1992."},{"key":"e_1_3_2_1_10_1","unstructured":"E. Haugh and M. Bishop. Testing c programs for buffer overflow vulnerabilities.  E. Haugh and M. Bishop. Testing c programs for buffer overflow vulnerabilities."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/227726.227740"},{"key":"e_1_3_2_1_12_1","volume-title":"In Proceedings of the USENIX Security Symposium","author":"Larochelle D.","year":"2001","unstructured":"D. Larochelle and D. Evans . Statically detecting likely buffer overflow vulnerabilities . In In Proceedings of the USENIX Security Symposium , Washington, DC, USA , Aug 2001 . D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In In Proceedings of the USENIX Security Symposium, Washington, DC, USA, Aug 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v14:2"},{"key":"e_1_3_2_1_14_1","first-page":"173","volume-title":"Proceedings of CASCON-99 - ponsored by IBM Canada and the National Reasearch Council of Canada","author":"Merlo E.","year":"1999","unstructured":"E. Merlo and G. Antoniol . A static measure of a subset of intra-procedural data flow testing coverage based on node coverage . In Proceedings of CASCON-99 - ponsored by IBM Canada and the National Reasearch Council of Canada , pages 173 -- 186 , Mississauga (Ontario) , November 8-11 1999 . E. Merlo and G. Antoniol. A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. In Proceedings of CASCON-99 - ponsored by IBM Canada and the National Reasearch Council of Canada, pages 173--186, Mississauga (Ontario), November 8-11 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_16_1","first-page":"159","volume-title":"Proceedings of the Network and Distributed System Security (NDSS) Symposium","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. Lam . A practical dynamic buffer overflow detector . In Proceedings of the Network and Distributed System Security (NDSS) Symposium , pages 159 -- 169 , Feb 2004 . O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In Proceedings of the Network and Distributed System Security (NDSS) Symposium, pages 159--169, Feb 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200001)30:1%3C61::AID-SPE292%3E3.0.CO;2-9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784731"},{"key":"e_1_3_2_1_20_1","volume-title":"Statistical Methods","author":"S. G. W.","year":"1989","unstructured":"S. G. W. and C. W. G. Statistical Methods . Iowa State University Press , 1989 . S. G. W. and C. W. G. Statistical Methods. Iowa State University Press, 1989."},{"key":"e_1_3_2_1_21_1","first-page":"3","volume-title":"Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00)","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. Foster , E. Brewer , and A. Aiken . A first step towards automated detection of buffer overrun vulnerabilities . In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00) , pages 3 -- 17 , San Diego, CA, USA , Feb 2000 . D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00), pages 3--17, San Diego, CA, USA, Feb 2000."},{"key":"e_1_3_2_1_22_1","unstructured":"M. Wall. GAlib - a C++ library of genetic algorithm components. http:\/\/lancet.mit.edu\/ga\/.  M. Wall. GAlib - a C++ library of genetic algorithm components. http:\/\/lancet.mit.edu\/ga\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"}],"event":{"name":"GECCO05: Genetic and Evolutionary Computation Conference","location":"Washington DC USA","acronym":"GECCO05","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1068009.1068185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:00Z","timestamp":1750262880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068185"}},"subtitle":["a new heuristic to generate stress testing data"],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":22,"alternative-id":["10.1145\/1068009.1068185","10.1145\/1068009"],"URL":"https:\/\/doi.org\/10.1145\/1068009.1068185","relation":{},"subject":[],"published":{"date-parts":[[2005,6,25]]},"assertion":[{"value":"2005-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}