{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:37Z","timestamp":1750220077336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1815883 CNS-1942235"],"award-info":[{"award-number":["CNS-1815883 CNS-1942235"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1145\/3491371.3491372","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T12:35:27Z","timestamp":1638448527000},"page":"29-39","source":"Crossref","is-referenced-by-count":0,"title":["Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis"],"prefix":"10.1145","author":[{"given":"Farhaan","family":"Fowze","sequence":"first","affiliation":[{"name":"University of Florida, USA"}]},{"given":"Tuba","family":"Yavuz","sequence":"additional","affiliation":[{"name":"University of Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. BlueBorne. https:\/\/www.armis.com\/blueborne\/.  [n.d.]. BlueBorne. https:\/\/www.armis.com\/blueborne\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. CVE-2017-1000251 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000251.  [n.d.]. CVE-2017-1000251 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000251."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. CVE-2018-20169 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-20169.  [n.d.]. CVE-2018-20169 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-20169."},{"volume-title":"mac80211: Properly access radiotap vendor data. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/stable\/linux.git\/commit\/net\/mac80211\/rx.c?id=d359bbce0601c6a19203a4b813a7e3910fcba282. last accessed","year":"2021","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Fraser Brown Deian Stefan and Dawson Engler. 2020. Sys: a Static\/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. (2020).  Fraser Brown Deian Stefan and Dawson Engler. 2020. Sys: a Static\/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. (2020)."},{"volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","year":"2008","author":"Cadar Cristian","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451152"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273464"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"David Gens Simon Schmitt Lucas Davi and Ahmad-Reza Sadeghi. 2018. K-Miner: Uncovering Memory Corruption in Linux.. In NDSS.  David Gens Simon Schmitt Lucas Davi and Ahmad-Reza Sadeghi. 2018. K-Miner: Uncovering Memory Corruption in Linux.. In NDSS.","DOI":"10.14722\/ndss.2018.23326"},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium. 49\u201364","year":"2013","author":"Haller Istvan","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 49\u201364.","author":"Ramos A","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00276-5"}],"event":{"name":"8th NSysS 2021: 8th International Conference on Networking, Systems and Security","acronym":"8th NSysS 2021","location":"Cox's Bazar Bangladesh"},"container-title":["8th International Conference on Networking, Systems and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491371.3491372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3491371.3491372","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491371.3491372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:20Z","timestamp":1750183760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491371.3491372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":14,"alternative-id":["10.1145\/3491371.3491372","10.1145\/3491371"],"URL":"https:\/\/doi.org\/10.1145\/3491371.3491372","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}