{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:00Z","timestamp":1750307280768,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,7]],"date-time":"2010-11-07T00:00:00Z","timestamp":1289088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,7]]},"DOI":"10.1145\/1882291.1882338","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"317-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Practical and effective symbolic analysis for buffer overflow detection"],"prefix":"10.1145","author":[{"given":"Lian","family":"Li","sequence":"first","affiliation":[{"name":"Oracle, Brisbane, Australia"}]},{"given":"Cristina","family":"Cifuentes","sequence":"additional","affiliation":[{"name":"Oracle, Brisbane, Australia"}]},{"given":"Nathan","family":"Keynes","sequence":"additional","affiliation":[{"name":"Oracle, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2010,11,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/1763507.1763523"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1368088.1368118"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1152154.1152198"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1002\/(SICI)1097-024X(200006)30:7%3C775::AID-SPE309%3E3.0.CO;2-H"},{"key":"e_1_3_2_1_5_1","first-page":"209","volume-title":"Proceedings of the 8th symposium on Operating Systems Design and Implementation","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th symposium on Operating Systems Design and Implementation , pages 209 -- 224 . USENIX Association , 2008 . C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th symposium on Operating Systems Design and Implementation, pages 209--224. USENIX Association, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Vulnerability type distributions in CVE. Technical report","author":"Christey S.","year":"2007","unstructured":"S. Christey and R. A. Martin . Vulnerability type distributions in CVE. Technical report , The MITRE Corporation , May 2007 . Version 1.1. S. Christey and R. A. Martin. Vulnerability type distributions in CVE. Technical report, The MITRE Corporation, May 2007. Version 1.1."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1555860.1555866"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1394504.1394505"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/512950.512973"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-540-31987-0_3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/115372.115320"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/52.976940"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/512529.512558"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/948109.948155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1134285.1134319"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/360248.360252"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1453101.1453137"},{"unstructured":"LLVM. Low Level Virtual Machine. http:\/\/www.llvm.org detail on website.  LLVM. Low Level Virtual Machine. http:\/\/www.llvm.org detail on website.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/clang.llvm.org\/StaticAnalysis.html. Last accessed","author":"Analyzer Clang Static","year":"2008","unstructured":"LLVM\/ Clang Static Analyzer . http:\/\/clang.llvm.org\/StaticAnalysis.html. Last accessed : 1 December 2008 . LLVM\/Clang Static Analyzer. http:\/\/clang.llvm.org\/StaticAnalysis.html. Last accessed: 1 December 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1542476.1542504"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/93542.93578"},{"key":"e_1_3_2_1_22_1","first-page":"159","volume-title":"Proceedings of the 11th Network and Distributed System Security Symposium","author":"Patrice Godefroid M. Y.","year":"2008","unstructured":"M. Y. Patrice Godefroid and D. Molnar . Automated whitebox fuzz testing . In Proceedings of the 11th Network and Distributed System Security Symposium , pages 159 -- 169 , 2008 . M. Y. Patrice Godefroid and D. Molnar. Automated whitebox fuzz testing. In Proceedings of the 11th Network and Distributed System Security Symposium, pages 159--169, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1390630.1390635"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/349299.349325"},{"key":"e_1_3_2_1_25_1","first-page":"159","volume-title":"Proceedings of the 11th Network and Distributed System Security Symposium","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A practical dynamic buffer overflow detector . In Proceedings of the 11th Network and Distributed System Security Symposium , pages 159 -- 169 , 2004 . O. Ruwase and M. S. Lam. A practical dynamic buffer overflow detector. In Proceedings of the 11th Network and Distributed System Security Symposium, pages 159--169, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.5555\/1247360.1247362"},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/spinroot.com\/uno\/. Last accessed","author":"Synopsis Uno Tool","year":"2007","unstructured":"Uno Tool Synopsis . http:\/\/spinroot.com\/uno\/. Last accessed : 26 October 2007 . Uno Tool Synopsis. http:\/\/spinroot.com\/uno\/. Last accessed: 26 October 2007."},{"key":"e_1_3_2_1_28_1","volume-title":"Asterisk: the future of telephony","author":"Meggelen J. Van","year":"2007","unstructured":"J. Van Meggelen , J. Smith , and L. Madsen . Asterisk: the future of telephony , 2 nd edition. O'Reilly , 2007 . J. Van Meggelen, J. Smith, and L. Madsen. Asterisk: the future of telephony, 2nd edition. O'Reilly, 2007.","edition":"2"},{"key":"e_1_3_2_1_29_1","first-page":"3","volume-title":"Proceedings of the 7th Network and Distributed System Security Symposium","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A first step towards automated detection of buffer overrun vulnerabilities . In Proceedings of the 7th Network and Distributed System Security Symposium , pages 3 -- 17 , 2000 . D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the 7th Network and Distributed System Security Symposium, pages 3--17, 2000."},{"key":"e_1_3_2_1_30_1","volume-title":"http:\/\/www.dwheeler.com\/sloccount\/. Last accessed","author":"Wheeler D. A.","year":"2009","unstructured":"D. A. Wheeler . SLOC Count User Guide . http:\/\/www.dwheeler.com\/sloccount\/. Last accessed : 16 March 2009 . D. A. Wheeler. SLOC Count User Guide. http:\/\/www.dwheeler.com\/sloccount\/. Last accessed: 16 March 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/1232420.1232423"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/940071.940115"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"SIGSOFT\/FSE'10","name":"SIGSOFT\/FSE'10: 18th ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Santa Fe New Mexico USA"},"container-title":["Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882291.1882338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882291.1882338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:30Z","timestamp":1750244370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882291.1882338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,7]]},"references-count":32,"alternative-id":["10.1145\/1882291.1882338","10.1145\/1882291"],"URL":"https:\/\/doi.org\/10.1145\/1882291.1882338","relation":{},"subject":[],"published":{"date-parts":[[2010,11,7]]},"assertion":[{"value":"2010-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}