{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:57:45Z","timestamp":1773154665433,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NIETP","award":["CAE Cybersecurity Grant"],"award-info":[{"award-number":["CAE Cybersecurity Grant"]}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421 W911NF-15-1-0576"],"award-info":[{"award-number":["W911NF-13-1-0421 W911NF-15-1-0576"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1422594 CNS-1505664"],"award-info":[{"award-number":["CNS-1422594 CNS-1505664"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978340","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"529-540","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["CREDAL"],"prefix":"10.1145","author":[{"given":"Jun","family":"Xu","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Dongliang","family":"Mu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Pei","family":"Wang","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abc2midi 2004--12-04 - multiple stack buffer overflow vulnerabilities. https:\/\/www.exploit-db.com\/exploits\/25019\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Analysis of nginx 1.3.9\/1.4.0 stack buffer overflow and x64 exploitation (cve-2013--2028). http:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve-2013--2028.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple quicktime (rtsp url handler) stack buffer overflow exploit. https:\/\/www.exploit-db.com\/exploits\/3064\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Asterisk <= 1.0.12 \/ 1.2.12.1 (chan_skinny) remote heap overflow (poc). https:\/\/www.exploit-db.com\/exploits\/2597\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Blender blenloader 2.x file processing integer overflow vulnerability. https:\/\/www.exploit-db.com\/exploits\/26915\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Da's dwarf page. https:\/\/www.prevanders.net\/dwarf.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Gaim <= 1.2.1 url handling remote stack overflow exploit. https:\/\/www.exploit-db.com\/exploits\/999\/."},{"key":"e_1_3_2_1_8_1","unstructured":"libdisasm: x86 disassembler library. http:\/\/bastard.sourceforge.net\/libdisasm.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Libelf - free software directory. https:\/\/directory.fsf.org\/wiki\/Libelf."},{"key":"e_1_3_2_1_10_1","unstructured":"The libunwind project. http:\/\/www.nongnu.org\/libunwind\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Linux programmer's manual. http:\/\/man7.org\/linux\/man-pages\/man7\/signal.7.html."},{"key":"e_1_3_2_1_12_1","unstructured":"The llvm compiler infrastructure. http:\/\/llvm.org\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Nginx 1.3.9--1.4.0 - dos poc. http:\/\/seclists.org\/fulldisclosure\/2013\/Jul\/att-90\/ngxunlock_pl.bin.","DOI":"10.1155\/2013\/694169"},{"key":"e_1_3_2_1_14_1","unstructured":"Offensive security exploit database archive. https:\/\/www.exploit-db.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Safari 5.02 - stack overflow denial of service. https:\/\/www.exploit-db.com\/exploits\/15558\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Sun java runtime environment 1.6 - web start jnlp file stack buffer overflow vulnerability. https:\/\/www.exploit-db.com\/exploits\/30284\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_18_1","unstructured":"D. D. I. F. Committee. Dwarf debugging information format (version 4). http:\/\/www.dwarfstd.org\/doc\/DWARF4.pdf 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884844"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337364"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.66"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958261"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685061"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/894162"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029907"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855773"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542504"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2784772"},{"key":"e_1_3_2_1_31_1","volume-title":"Cores, debugging, and coverage. Technical report","author":"Ohmann P.","year":"2015","unstructured":"P. Ohmann and B. Liblit. Cores, debugging, and coverage. Technical report, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2846650.2846651"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190225"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267925"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509543"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342849"},{"key":"e_1_3_2_1_40_1","volume-title":"Two approaches to interprocedural data flow analysis","author":"Sharir M.","year":"1978","unstructured":"M. Sharir and A. Pnueli. Two approaches to interprocedural data flow analysis. New York University. Courant Institute of Mathematical Sciences. Computer Science Department, 1978."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.232013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950369"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978340","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978340","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:25:20Z","timestamp":1763457920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978340"}},"subtitle":["Towards Locating a Memory Corruption Vulnerability with Your Core Dump"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":46,"alternative-id":["10.1145\/2976749.2978340","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978340","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}