{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:00Z","timestamp":1750220400198,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1145\/3474624.3474633","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T19:47:46Z","timestamp":1633463266000},"page":"39-48","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Technique to Detect Weaknesses in C Programs"],"prefix":"10.1145","author":[{"given":"Raphael","family":"Muniz","sequence":"first","affiliation":[{"name":"Instituto Federal do Rio Grande do Norte, Brazil"}]},{"given":"Wilkerson","family":"Andrade","sequence":"additional","affiliation":[{"name":"Universidade Federal de Campina Grande, Brazil"}]},{"given":"Patricia","family":"Machado","sequence":"additional","affiliation":[{"name":"Universidade Federal de Campina Grande, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149119"},{"volume-title":"Proceedings of the 13rd International Conference on Software Engineering. IEEE","author":"Bounimova E.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"B. Chess and J. West. 2007. Secure programming with static analysis. Pearson Education.  B. Chess and J. West. 2007. Secure programming with static analysis. Pearson Education."},{"volume-title":"Proceedings of the 25th Symposium on Applied Computing. ACM","year":"1963","author":"Chowdhury I.","key":"e_1_3_2_1_4_1"},{"volume-title":"International Workshop on Verification, Model Checking, and Abstract Interpretation. ACM, St","author":"Christakis M.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Christey M. Brown D. Kirby B. Martin and A. Paller. 2011. CWE\/SANS top 25 most dangerous software errors. Common Weakness Enumeration(2011).  S. Christey M. Brown D. Kirby B. Martin and A. Paller. 2011. CWE\/SANS top 25 most dangerous software errors. Common Weakness Enumeration(2011)."},{"key":"e_1_3_2_1_7_1","unstructured":"S. Christey J. Kenderdine J. Mazella and B. Miles. 2013. Common Weakness Enumeration. Mitre Corporation (2013).  S. Christey J. Kenderdine J. Mazella and B. Miles. 2013. Common Weakness Enumeration. Mitre Corporation (2013)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2018.00023"},{"volume-title":"Retrieved","year":"2021","author":"Cppcheck","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. Evans. 1996. Static detection of dynamic memory errors. In ACM SIGPLAN Notices Vol.\u00a031. ACM 44\u201353.  D. Evans. 1996. Static detection of dynamic memory errors. In ACM SIGPLAN Notices Vol.\u00a031. ACM 44\u201353.","DOI":"10.1145\/249069.231389"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196884"},{"volume-title":"Proceedings of the 22nd USENIX Conference on Security. 273\u2013288","author":"Finifter M.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Flawfinder 2021.. Retrieved May 15 2021 from https:\/\/dwheeler.com\/flawfinder\/  Flawfinder 2021.. Retrieved May 15 2021 from https:\/\/dwheeler.com\/flawfinder\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267102.1267108"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"S. Frei D. Schatzmann B. Plattner and B. Trammell. 2010. Modeling the security ecosystem - the dynamics of (In)security. Springer US 79\u2013106.  S. Frei D. Schatzmann B. Plattner and B. Trammell. 2010. Modeling the security ecosystem - the dynamics of (In)security. Springer US 79\u2013106.","DOI":"10.1007\/978-1-4419-6967-5_6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"volume-title":"1044-2009-IEEE Standard Classification for Software Anomalies","year":"2010","author":"ISDW Group 2010.","key":"e_1_3_2_1_17_1"},{"volume-title":"Mohd\u00a0Faizal Ab\u00a0Razak, Ahmad Firdaus, and Nor\u00a0Badrul Anuar.","year":"2021","author":"Hanif Hazim","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Howard D. LeBlanc and J. Viega. 2010. 24 deadly sins of software security: programming flaws and how to fix them. McGraw-Hill Inc.  M. Howard D. LeBlanc and J. Viega. 2010. 24 deadly sins of software security: programming flaws and how to fix them. McGraw-Hill Inc."},{"key":"e_1_3_2_1_20_1","first-page":"2012","article-title":"Using fuzzing to detect security vulnerabilities","volume":"26","author":"Jurani\u0107 L.","year":"2006","journal-title":"Retrieved Apr"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"volume-title":"Software vulnerability analysis","author":"Krsul Ivan\u00a0Victor","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Thien La. 2002. Secure software development and code analysis tools. SANS Inst. InfoSec Read. Room(2002) 1\u201351.  Thien La. 2002. Secure software development and code analysis tools. SANS Inst. InfoSec Read. Room(2002) 1\u201351."},{"volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2201\u20132215","author":"Li F.","key":"e_1_3_2_1_24_1"},{"volume-title":"Building security in maturity model. Fortify & Cigital","year":"2009","author":"McGraw Gary","key":"e_1_3_2_1_25_1"},{"volume-title":"Proceedings of the 12th International Workshop on Variability Modeling of Software-Intensive Systems. 51\u201358","author":"Muniz R.","key":"e_1_3_2_1_26_1"},{"volume-title":"Retrieved","year":"2021","author":"National Vulnerability Database","key":"e_1_3_2_1_27_1"},{"volume-title":"Retrieved","year":"2021","author":"National Vulnerability Database","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"N. Nethercote and J. Seward. 2007. Valgrind: a framework for heavyweight dynamic binary instrumentation. In ACM Sigplan notices Vol.\u00a042. ACM 89\u2013100.  N. Nethercote and J. Seward. 2007. Valgrind: a framework for heavyweight dynamic binary instrumentation. In ACM Sigplan notices Vol.\u00a042. ACM 89\u2013100.","DOI":"10.1145\/1273442.1250746"},{"volume-title":"Proceedings of the 14th Conference on Computer and Communications Security. 529\u2013540","author":"Neuhaus S.","key":"e_1_3_2_1_30_1"},{"volume-title":"Text filtering and ranking for security bug report prediction","year":"2017","author":"Peters Fayola","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"C.\u00a0P. Pfleeger S.\u00a0L. Pfleeger and J. Margulies. 2015. Security in computing. Prentice Hall Professional Technical Reference.  C.\u00a0P. Pfleeger S.\u00a0L. Pfleeger and J. Margulies. 2015. Security in computing. Prentice Hall Professional Technical Reference."},{"key":"e_1_3_2_1_33_1","unstructured":"M. Sutton A. Greene and P. Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education.  M. Sutton A. Greene and P. Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00018-9_3"},{"volume-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 999\u20131010","year":"2020","author":"Wang Haijun","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.290110854"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544310"}],"event":{"name":"SBES '21: Brazilian Symposium on Software Engineering","acronym":"SBES '21","location":"Joinville Brazil"},"container-title":["Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474624.3474633","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474624.3474633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:50Z","timestamp":1750191530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474624.3474633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":38,"alternative-id":["10.1145\/3474624.3474633","10.1145\/3474624"],"URL":"https:\/\/doi.org\/10.1145\/3474624.3474633","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]}}}