{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T15:04:03Z","timestamp":1775055843366,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,2]],"date-time":"2015-03-02T00:00:00Z","timestamp":1425254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["257007-Syssec"],"award-info":[{"award-number":["257007-Syssec"]}]},{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}]},{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["259108-Rosetta"],"award-info":[{"award-number":["259108-Rosetta"]}]},{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["Ph.D. Scholarship 2011-049"],"award-info":[{"award-number":["Ph.D. Scholarship 2011-049"]}]},{"DOI":"10.13039\/100006112","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["257007-Syssec"],"award-info":[{"award-number":["257007-Syssec"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["259108-Rosetta"],"award-info":[{"award-number":["259108-Rosetta"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["Ph.D. Scholarship 2011-049"],"award-info":[{"award-number":["Ph.D. Scholarship 2011-049"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["257007-Syssec"],"award-info":[{"award-number":["257007-Syssec"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["259108-Rosetta"],"award-info":[{"award-number":["259108-Rosetta"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["Ph.D. Scholarship 2011-049"],"award-info":[{"award-number":["Ph.D. Scholarship 2011-049"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["257007-Syssec"],"award-info":[{"award-number":["257007-Syssec"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["COMET K1"],"award-info":[{"award-number":["COMET K1"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["259108-Rosetta"],"award-info":[{"award-number":["259108-Rosetta"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","award":["Ph.D. Scholarship 2011-049"],"award-info":[{"award-number":["Ph.D. Scholarship 2011-049"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,2]]},"DOI":"10.1145\/2699026.2699098","type":"proceedings-article","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T16:02:15Z","timestamp":1424707335000},"page":"87-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["The BORG"],"prefix":"10.1145","author":[{"given":"Matthias","family":"Neugschwandtner","sequence":"first","affiliation":[{"name":"SBA Research, Wien, Austria"}]},{"given":"Paolo","family":"Milani Comparetti","sequence":"additional","affiliation":[{"name":"Lastline Inc., Goleta, CA, USA"}]},{"given":"Istvan","family":"Haller","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, Amsterdam, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2015,3,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Avgerinos T.","year":"2011","unstructured":"T. Avgerinos , S. K. Cha , B. L. T. Hao , and D. Brumley . AEG: Automatic Exploit Generation . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , 2011 . T. Avgerinos, S. K. Cha, B. L. T. Hao, and D. Brumley. AEG: Automatic Exploit Generation. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC)","author":"Bugrara S.","year":"2013","unstructured":"S. Bugrara and D. Engler . Redundant State Detection for Dynamic Symbolic Execution . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) , 2013 . S. Bugrara and D. Engler. Redundant State Detection for Dynamic Symbolic Execution. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC), 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the USENIX Conference on Operating Systems Design and Implementation (OSDI)","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the USENIX Conference on Operating Systems Design and Implementation (OSDI) , 2008 . C. Cadar, D. Dunbar, and D. Engler. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation (OSDI), 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671277"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX SEC)","author":"Cho C. Y.","year":"2011","unstructured":"C. Y. Cho , D. Babi\u0107 , P. Poosankam , K. Z. Chen , E. X. Wu , and D. Song . MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery . In Proceedings of the USENIX Security Symposium (USENIX SEC) , 2011 . C. Y. Cho, D. Babi\u0107, P. Poosankam, K. Z. Chen, E. X. Wu, and D. Song. MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2011."},{"key":"e_1_3_2_1_14_1","unstructured":"Codenomicon. The Heartbleed Bug. heartbleed.com.  Codenomicon. The Heartbleed Bug. heartbleed.com."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451152"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_17_1","volume-title":"William Polloc","author":"Eagle C.","year":"2011","unstructured":"C. Eagle . The IDA Pro Book . William Polloc , 2011 . C. Eagle. The IDA Pro Book. William Polloc, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Network and Distributed System Security Conference (NDSS)","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Levin , and D. Molnar . Automated whitebox fuzz testing . In Proceedings of the Network and Distributed System Security Conference (NDSS) , 2008 . P. Godefroid, M. Levin, and D. Molnar. Automated whitebox fuzz testing. In Proceedings of the Network and Distributed System Security Conference (NDSS), 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001424"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the European Workshop on System Security (Eurosec)","author":"Haller I.","year":"2013","unstructured":"I. Haller , A. Slowinska , and H. Bos . Dowser: a guided fuzzer to find buffer overflow vulnerabilities . In Proceedings of the European Workshop on System Security (Eurosec) , 2013 . I. Haller, A. Slowinska, and H. Bos. Dowser: a guided fuzzer to find buffer overflow vulnerabilities. In Proceedings of the European Workshop on System Security (Eurosec), 2013."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX SEC)","author":"Haller I.","year":"2013","unstructured":"I. Haller , A. Slowinska , M. Neugschwandtner , and H. Bos . Dowsing for overflows: A guided fuzzer to find buffer boundary violations . In Proceedings of the USENIX Security Symposium (USENIX SEC) , 2013 . I. Haller, A. Slowinska, M. Neugschwandtner, and H. Bos. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of the USENIX Security Symposium (USENIX SEC), 2013."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Kang M. G.","year":"2011","unstructured":"M. G. Kang , S. McCamant , P. Poosankam , and D. Song . DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , 2011 . M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041563"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337308"},{"key":"e_1_3_2_1_28_1","unstructured":"NIST. National Vulnerability Database. web.nvd.nist.gov.  NIST. National Vulnerability Database. web.nvd.nist.gov."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993558"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02652-2_16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572299"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC)","author":"Serebryany K.","year":"2012","unstructured":"K. Serebryany , D. Bruening , A. Potapenko , and D. Vyukov . Addresssanitizer: A fast address sanity checker . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) , 2012 . K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov. Addresssanitizer: A fast address sanity checker. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC), 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(81)90008-0"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Slowinska A.","year":"2011","unstructured":"A. Slowinska , T. Stancescu , and H. Bos . Howard: a dynamic excavator for reverse engineering data structures . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , 2011 . A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_37_1","volume-title":"Blackhat","author":"Sotirov A.","year":"2008","unstructured":"A. Sotirov and M. Dowd . Bypassing Browser Memory Protections: Setting back browser security by 10 years . In Blackhat , 2008 . A. Sotirov and M. Dowd. Bypassing Browser Memory Protections: Setting back browser security by 10 years. In Blackhat, 2008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"}],"event":{"name":"CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699026.2699098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2699026.2699098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:12Z","timestamp":1750227132000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699026.2699098"}},"subtitle":["Nanoprobing Binaries for Buffer Overreads"],"short-title":[],"issued":{"date-parts":[[2015,3,2]]},"references-count":39,"alternative-id":["10.1145\/2699026.2699098","10.1145\/2699026"],"URL":"https:\/\/doi.org\/10.1145\/2699026.2699098","relation":{},"subject":[],"published":{"date-parts":[[2015,3,2]]},"assertion":[{"value":"2015-03-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}