{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:15Z","timestamp":1750306875269,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381787","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"379-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic detection of printf format string vulnerabilities in software applications using static analysis"],"prefix":"10.1145","author":[{"given":"Radha","family":"Vedala","sequence":"first","affiliation":[{"name":"IDRBT University Of Hyderabad, Hyderabad"}]},{"given":"Simhadri Anil","family":"kumar","sequence":"additional","affiliation":[{"name":"IDRBT University Of Hyderabad, Hyderabad"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"volume-title":"Network and distributed system security symposium, 3--17.","author":"Wagner David","key":"e_1_3_2_1_1_1","unstructured":"Wagner , David , Jeffrey S . Foster , Eric A . Brewer , and Alexander Aiken . 2000. A first step towards automated detection of buffer overrun vulnerabilities . In Network and distributed system security symposium, 3--17. San Diego, CA, USA . Wagner, David, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Network and distributed system security symposium, 3--17. San Diego, CA, USA."},{"key":"e_1_3_2_1_2_1","unstructured":"Vipindeep V Pankaj Jalote. Efficient Static Analysis with Path Pruning using Coverage Data. Vipindeep V Pankaj Jalote. Efficient Static Analysis with Path Pruning using Coverage Data."},{"key":"e_1_3_2_1_4_1","unstructured":"Secure Software. RATS -- rough auditing tool for security.http:\/\/www.securesoftware.com\/resources\/tools.html Secure Software. RATS -- rough auditing tool for security.http:\/\/www.securesoftware.com\/resources\/tools.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Viega John J. T. Bloch Tadayoshi Kohno and Gary McGraw. 2002. ITS4: A static vulnerability scanner for C and C++ code. ACM Transactions on Information and System Security 5(2). Viega John J. T. Bloch Tadayoshi Kohno and Gary McGraw. 2002. ITS4: A static vulnerability scanner for C and C++ code. ACM Transactions on Information and System Security 5(2).","DOI":"10.1145\/545186.545188"},{"key":"e_1_3_2_1_6_1","volume-title":"2nd international Conference on Education Technology and Computer (ICETC), 257--261","author":"Mohammad Akbari Sarah Berenji","year":"2010","unstructured":"Mohammad Akbari , Sarah Berenji , RezaAzmi . 2010 . Vulnerability Detector using Parse Tree Annotation . In 2nd international Conference on Education Technology and Computer (ICETC), 257--261 . Mohammad Akbari, Sarah Berenji, RezaAzmi. 2010.Vulnerability Detector using Parse Tree Annotation. In 2nd international Conference on Education Technology and Computer (ICETC), 257--261."},{"key":"e_1_3_2_1_7_1","unstructured":"Wheeler David A. Flawfinder. http:\/\/www.dwheeler.com\/flawfinder\/. Wheeler David A. Flawfinder. http:\/\/www.dwheeler.com\/flawfinder\/."},{"key":"e_1_3_2_1_8_1","volume-title":"15th USENIX Security Symposium, 179--192","author":"Yichen Xie Alex Aiken","year":"2006","unstructured":"Yichen Xie , Alex Aiken . \"11. Static Detection of Security Vulnerabilities in Scripting Languages \". 15th USENIX Security Symposium, 179--192 , July , 2006 . Yichen Xie, Alex Aiken. \"11. Static Detection of Security Vulnerabilities in Scripting Languages\". 15th USENIX Security Symposium, 179--192, July, 2006."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381787","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:22Z","timestamp":1750234702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":7,"alternative-id":["10.1145\/2381716.2381787","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381787","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}