{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:24Z","timestamp":1763968524698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":98,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582814","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"247-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6633-460X","authenticated-orcid":false,"given":"Alexander","family":"K\u00fcchler","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9557-1647","authenticated-orcid":false,"given":"Leon","family":"Wenning","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3662-3798","authenticated-orcid":false,"given":"Florian","family":"Wendland","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. angr. https:\/\/angr.io  [n.d.]. angr. https:\/\/angr.io"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/  [n.d.]. Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. CodeHawk. github.com\/static-analysis-engineering\/codehawk  [n.d.]. CodeHawk. github.com\/static-analysis-engineering\/codehawk"},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. CodeHawk-Binary. https:\/\/github.com\/static-analysis-engineering\/CodeHawk-Binary  [n.d.]. CodeHawk-Binary. https:\/\/github.com\/static-analysis-engineering\/CodeHawk-Binary"},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. cwe_checker. https:\/\/github.com\/fkie-cad\/cwe_checker  [n.d.]. cwe_checker. https:\/\/github.com\/fkie-cad\/cwe_checker"},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Frama-C. https:\/\/frama-c.com\/  [n.d.]. Frama-C. https:\/\/frama-c.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. Juliet Test Suite for C\/C++. https:\/\/samate.nist.gov\/SARD\/test-suites\/112  [n.d.]. Juliet Test Suite for C\/C++. https:\/\/samate.nist.gov\/SARD\/test-suites\/112"},{"key":"e_1_3_2_1_8_1","volume-title":"Parallelizing Top-down Interprocedural Analyses. SIGPLAN Not. 47, 6","author":"Albarghouthi Aws","year":"2012","unstructured":"Aws Albarghouthi , Rahul Kumar , Aditya\u00a0 V. Nori , and Sriram\u00a0 K. Rajamani . 2012. Parallelizing Top-down Interprocedural Analyses. SIGPLAN Not. 47, 6 ( 2012 ). Aws Albarghouthi, Rahul Kumar, Aditya\u00a0V. Nori, and Sriram\u00a0K. Rajamani. 2012. Parallelizing Top-down Interprocedural Analyses. SIGPLAN Not. 47, 6 (2012)."},{"key":"e_1_3_2_1_9_1","article-title":"Static analysis by abstract interpretation: application to the detection of heap overflows","volume":"4","author":"Allamigeon Xavier","year":"2008","unstructured":"Xavier Allamigeon and Charles Hymans . 2008 . Static analysis by abstract interpretation: application to the detection of heap overflows . J. in Comput. Virol. 4 , 1 (2008). Xavier Allamigeon and Charles Hymans. 2008. Static analysis by abstract interpretation: application to the detection of heap overflows. J. in Comput. Virol. 4, 1 (2008).","journal-title":"J. in Comput. Virol."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61739-6_33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Edd Barrett and Andy King. 2012. Range Analysis of Binaries with Minimal Effort. In Formal Methods for Industrial Critical Systems.  Edd Barrett and Andy King. 2012. Range Analysis of Binaries with Minimal Effort. In Formal Methods for Industrial Critical Systems.","DOI":"10.1007\/978-3-642-32469-7_7"},{"key":"e_1_3_2_1_13_1","volume-title":"ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Bian Pan","year":"2020","unstructured":"Pan Bian , Bin Liang , Jianjun Huang , Wenchang Shi , Xidong Wang , and Jian Zhang . 2020 . SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed . In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, and Jian Zhang. 2020. SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering."},{"key":"e_1_3_2_1_14_1","volume-title":"IKOS: A Framework for Static Analysis Based on Abstract Interpretation. In Software Engineering and Formal Methods.","author":"Brat Guillaume","year":"2014","unstructured":"Guillaume Brat , Jorge\u00a0 A. Navas , Nija Shi , and Arnaud Venet . 2014 . IKOS: A Framework for Static Analysis Based on Abstract Interpretation. In Software Engineering and Formal Methods. Guillaume Brat, Jorge\u00a0A. Navas, Nija Shi, and Arnaud Venet. 2014. IKOS: A Framework for Static Analysis Based on Abstract Interpretation. In Software Engineering and Formal Methods."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J\u00f6rg Brauer Andy King and Stefan Kowalewski. 2010. Range Analysis of Microcontroller Code Using Bit-Level Congruences. In Formal Methods for Industrial Critical Systems.  J\u00f6rg Brauer Andy King and Stefan Kowalewski. 2010. Range Analysis of Microcontroller Code Using Bit-Level Congruences. In Formal Methods for Industrial Critical Systems.","DOI":"10.1007\/978-3-642-15898-8_6"},{"key":"e_1_3_2_1_16_1","volume-title":"Abstract interpretation of microcontroller code: Intervals meet congruences. Sci. Comput. Program. 78","author":"Brauer J\u00f6rg","year":"2013","unstructured":"J\u00f6rg Brauer , Andy King , and Stefan Kowalewski . 2013. Abstract interpretation of microcontroller code: Intervals meet congruences. Sci. Comput. Program. 78 ( 2013 ). J\u00f6rg Brauer, Andy King, and Stefan Kowalewski. 2013. Abstract interpretation of microcontroller code: Intervals meet congruences. Sci. Comput. Program. 78 (2013)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811212.1811216"},{"key":"e_1_3_2_1_18_1","volume-title":"RICH: Automatically Protecting Against Integer-Based Vulnerabilities. In Network and Distributed System Security Symposium.","author":"Brumley David","year":"2007","unstructured":"David Brumley , Dawn Song , Tzicker Chiueh , Rob Johnson , and Huija Lin . 2007 . RICH: Automatically Protecting Against Integer-Based Vulnerabilities. In Network and Distributed System Security Symposium. David Brumley, Dawn Song, Tzicker Chiueh, Rob Johnson, and Huija Lin. 2007. RICH: Automatically Protecting Against Integer-Based Vulnerabilities. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_19_1","unstructured":"Stefan Bygde. 2011. Static analysis on executable code-a survey.  Stefan Bygde. 2011. Static analysis on executable code-a survey."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation.","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson\u00a0 R Engler , 2008 . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs .. In USENIX Symposium on Operating Systems Design and Implementation. Cristian Cadar, Daniel Dunbar, Dawson\u00a0R Engler, 2008. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ping Chen Hao Han Yi Wang Xiaobin Shen Xinchun Yin Bing Mao and Li Xie. 2009. IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. In Information and Communications Security.  Ping Chen Hao Han Yi Wang Xiaobin Shen Xinchun Yin Bing Mao and Li Xie. 2009. IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. In Information and Communications Security.","DOI":"10.1007\/978-3-642-11145-7_26"},{"key":"e_1_3_2_1_22_1","volume-title":"BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. In International Conference on Availability, Reliability and Security.","author":"Chen Ping","year":"2009","unstructured":"Ping Chen , Yi Wang , Zhi Xin , Li Xie , and Bing Mao . 2009 . BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. In International Conference on Availability, Reliability and Security. Ping Chen, Yi Wang, Zhi Xin, Li Xie, and Bing Mao. 2009. BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. In International Conference on Availability, Reliability and Security."},{"key":"e_1_3_2_1_23_1","volume-title":"ACM SIGPLAN Conference on Programming Language Design and Implementation.","author":"Cheng Ben-Chung","year":"2000","unstructured":"Ben-Chung Cheng and Wen-Mei\u00a0 W. Hwu . 2000 . Modular Interprocedural Pointer Analysis Using Access Paths: Design, Implementation, and Evaluation . In ACM SIGPLAN Conference on Programming Language Design and Implementation. Ben-Chung Cheng and Wen-Mei\u00a0W. Hwu. 2000. Modular Interprocedural Pointer Analysis Using Access Paths: Design, Implementation, and Evaluation. In ACM SIGPLAN Conference on Programming Language Design and Implementation."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_25_1","volume-title":"Static Determination of Dynamic Properties of Generalized Type Unions. In ACM Conference on Language Design for Reliable Software.","author":"Cousot Patrick","year":"1977","unstructured":"Patrick Cousot and Radhia Cousot . 1977 . Static Determination of Dynamic Properties of Generalized Type Unions. In ACM Conference on Language Design for Reliable Software. Patrick Cousot and Radhia Cousot. 1977. Static Determination of Dynamic Properties of Generalized Type Unions. In ACM Conference on Language Design for Reliable Software."},{"key":"e_1_3_2_1_26_1","volume-title":"Constructive Versions Of Tarski\u2019s Fixed Point Theorems. Pac. J. Mat. 82","author":"Cousot Patrick","year":"1979","unstructured":"Patrick Cousot and Radhia Cousot . 1979. Constructive Versions Of Tarski\u2019s Fixed Point Theorems. Pac. J. Mat. 82 ( 1979 ). Patrick Cousot and Radhia Cousot. 1979. Constructive Versions Of Tarski\u2019s Fixed Point Theorems. Pac. J. Mat. 82 (1979)."},{"key":"e_1_3_2_1_27_1","volume-title":"International Symposium on Programming Language Implementation and Logic Programming.","author":"Cousot Patrick","year":"1992","unstructured":"Patrick Cousot and Radhia Cousot . 1992 . Comparing the Galois connection and widening\/narrowing approaches to abstract interpretation . In International Symposium on Programming Language Implementation and Logic Programming. Patrick Cousot and Radhia Cousot. 1992. Comparing the Galois connection and widening\/narrowing approaches to abstract interpretation. In International Symposium on Programming Language Implementation and Logic Programming."},{"key":"e_1_3_2_1_28_1","volume-title":"Symposium on Theoretical Aspects of Software Engineering.","author":"Cousot Patrick","year":"2007","unstructured":"Patrick Cousot , Radhia Cousot , J\u00e9r\u00f4me Feret , Mine Antoine , Laurent Mauborgne , David Monniaux , and Xavier Rival . 2007 . Varieties of static analyzers: A comparison with ASTR\u00c9E . In Symposium on Theoretical Aspects of Software Engineering. Patrick Cousot, Radhia Cousot, J\u00e9r\u00f4me Feret, Mine Antoine, Laurent Mauborgne, David Monniaux, and Xavier Rival. 2007. Varieties of static analyzers: A comparison with ASTR\u00c9E. In Symposium on Theoretical Aspects of Software Engineering."},{"key":"e_1_3_2_1_29_1","volume-title":"The ASTRE\u00c9 Analyzer. In European Symposium on Programming.","author":"Cousot Patrick","year":"2005","unstructured":"Patrick Cousot , Radhia Cousot , Jer\u00f4me Feret , Laurent Mauborgne , Antoine Min\u00e9 , David Monniaux , and Xavier Rival . 2005 . The ASTRE\u00c9 Analyzer. In European Symposium on Programming. Patrick Cousot, Radhia Cousot, Jer\u00f4me Feret, Laurent Mauborgne, Antoine Min\u00e9, David Monniaux, and Xavier Rival. 2005. The ASTRE\u00c9 Analyzer. In European Symposium on Programming."},{"key":"e_1_3_2_1_30_1","volume-title":"International Symposium on Software Reliability Engineering.","author":"Dannenberg B","year":"2010","unstructured":"Roger\u00a0 B Dannenberg , Will Dormann , David Keaton , Robert\u00a0 C Seacord , David Svoboda , Alex Volkovitsky , Timothy Wilson , and Thomas Plum . 2010 . As-if infinitely ranged integer model . In International Symposium on Software Reliability Engineering. Roger\u00a0B Dannenberg, Will Dormann, David Keaton, Robert\u00a0C Seacord, David Svoboda, Alex Volkovitsky, Timothy Wilson, and Thomas Plum. 2010. As-if infinitely ranged integer model. In International Symposium on Software Reliability Engineering."},{"key":"e_1_3_2_1_31_1","volume-title":"Integer Overflow Vulnerabilities Detection in Software Binary Code. In International Conference on Security of Information and Networks.","author":"Demidov Roman","year":"2017","unstructured":"Roman Demidov , Alexander Pechenkin , and Peter Zegzhda . 2017 . Integer Overflow Vulnerabilities Detection in Software Binary Code. In International Conference on Security of Information and Networks. Roman Demidov, Alexander Pechenkin, and Peter Zegzhda. 2017. Integer Overflow Vulnerabilities Detection in Software Binary Code. In International Conference on Security of Information and Networks."},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Software Engineering.","author":"Dietz Will","year":"2012","unstructured":"Will Dietz , Peng Li , John Regehr , and Vikram Adve . 2012 . Understanding integer overflow in C\/C++ . In International Conference on Software Engineering. Will Dietz, Peng Li, John Regehr, and Vikram Adve. 2012. Understanding integer overflow in C\/C++. In International Conference on Software Engineering."},{"key":"e_1_3_2_1_33_1","volume-title":"CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In USENIX Security Symposium.","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris Kopf , Laurent Mauborgne , and Jan Reineke . 2013 . CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In USENIX Security Symposium. Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","volume-title":"Article 11 (oct","author":"Elder Matt","year":"2014","unstructured":"Matt Elder , Junghee Lim , Tushar Sharma , Tycho Andersen , and Thomas Reps . 2014. Abstract Domains of Affine Relations. ACM Trans. Program. Lang. Syst ., Article 11 (oct 2014 ). Matt Elder, Junghee Lim, Tushar Sharma, Tycho Andersen, and Thomas Reps. 2014. Abstract Domains of Affine Relations. ACM Trans. Program. Lang. Syst., Article 11 (oct 2014)."},{"key":"e_1_3_2_1_35_1","volume-title":"Network and Distributed System Security Symposium.","author":"Emamdoost Navid","year":"2021","unstructured":"Navid Emamdoost , Qiushi Wu , Kangjie Lu , and Stephen McCamant . 2021 . Detecting kernel memory leaks in specialized modules with ownership reasoning . In Network and Distributed System Security Symposium. Navid Emamdoost, Qiushi Wu, Kangjie Lu, and Stephen McCamant. 2021. Detecting kernel memory leaks in specialized modules with ownership reasoning. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_36_1","unstructured":"Facebook. [n.d.]. Infer Static Analyzer. https:\/\/fbinfer.com\/  Facebook. [n.d.]. Infer Static Analyzer. https:\/\/fbinfer.com\/"},{"key":"e_1_3_2_1_37_1","unstructured":"Christoph Gentsch. 2020. Evaluation of Open Source Static Analysis Security Testing (SAST) Tools for C. DLR-IB-DW-JE-2020-16.  Christoph Gentsch. 2020. Evaluation of Open Source Static Analysis Security Testing (SAST) Tools for C. DLR-IB-DW-JE-2020-16."},{"key":"e_1_3_2_1_38_1","volume-title":"Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions. In ACM SIGPLAN Conference on Programming Language Design and Implementation.","author":"Gershuni Elazar","year":"2019","unstructured":"Elazar Gershuni , Nadav Amit , Arie Gurfinkel , Nina Narodytska , Jorge\u00a0 A. Navas , Noam Rinetzky , Leonid Ryzhyk , and Mooly Sagiv . 2019 . Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions. In ACM SIGPLAN Conference on Programming Language Design and Implementation. Elazar Gershuni, Nadav Amit, Arie Gurfinkel, Nina Narodytska, Jorge\u00a0A. Navas, Noam Rinetzky, Leonid Ryzhyk, and Mooly Sagiv. 2019. Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions. In ACM SIGPLAN Conference on Programming Language Design and Implementation."},{"key":"e_1_3_2_1_39_1","volume-title":"Compositional May-Must Program Analysis: Unleashing the Power of Alternation. SIGPLAN Not. 45, 1","author":"Godefroid Patrice","year":"2010","unstructured":"Patrice Godefroid , Aditya\u00a0 V. Nori , Sriram\u00a0 K. Rajamani , and Sai\u00a0Deep Tetali . 2010. Compositional May-Must Program Analysis: Unleashing the Power of Alternation. SIGPLAN Not. 45, 1 ( 2010 ). Patrice Godefroid, Aditya\u00a0V. Nori, Sriram\u00a0K. Rajamani, and Sai\u00a0Deep Tetali. 2010. Compositional May-Must Program Analysis: Unleashing the Power of Alternation. SIGPLAN Not. 45, 1 (2010)."},{"key":"e_1_3_2_1_40_1","volume-title":"Jeremy Leconte, Leo Liberti, and Fabrizio Marinelli.","author":"Goubault Eric","year":"2010","unstructured":"Eric Goubault , St\u00e9phane Le Roux , Jeremy Leconte, Leo Liberti, and Fabrizio Marinelli. 2010 . Static Analysis by Abstract Interpretation : A Mathematical Programming Approach. Electron. Notes Theor. Comput. Sci . 267, 1 (2010). Eric Goubault, St\u00e9phane Le Roux, Jeremy Leconte, Leo Liberti, and Fabrizio Marinelli. 2010. Static Analysis by Abstract Interpretation: A Mathematical Programming Approach. Electron. Notes Theor. Comput. Sci. 267, 1 (2010)."},{"key":"e_1_3_2_1_41_1","volume-title":"Separate Computation of Alias Information for Reuse. SIGSOFT Softw. Eng. Notes 21, 3","author":"Harrold Mary\u00a0Jean","year":"1996","unstructured":"Mary\u00a0Jean Harrold and Gregg Rothermel . 1996. Separate Computation of Alias Information for Reuse. SIGSOFT Softw. Eng. Notes 21, 3 ( 1996 ). Mary\u00a0Jean Harrold and Gregg Rothermel. 1996. Separate Computation of Alias Information for Reuse. SIGSOFT Softw. Eng. Notes 21, 3 (1996)."},{"key":"e_1_3_2_1_42_1","volume-title":"Characterizing and Improving Bug-Finders with Synthetic Bugs. In IEEE International Conference on Software Analysis, Evolution and Reengineering.","author":"Hu Yu","year":"2022","unstructured":"Yu Hu , Zekun Shen , and Brendan Dolan-Gavitt . 2022 . Characterizing and Improving Bug-Finders with Synthetic Bugs. In IEEE International Conference on Software Analysis, Evolution and Reengineering. Yu Hu, Zekun Shen, and Brendan Dolan-Gavitt. 2022. Characterizing and Improving Bug-Finders with Synthetic Bugs. In IEEE International Conference on Software Analysis, Evolution and Reengineering."},{"key":"e_1_3_2_1_43_1","volume-title":"ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages.","author":"Kildall A.","year":"1973","unstructured":"Gary\u00a0 A. Kildall . 1973 . A Unified Approach to Global Program Optimization . In ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages. Gary\u00a0A. Kildall. 1973. A Unified Approach to Global Program Optimization. In ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages."},{"key":"e_1_3_2_1_44_1","volume-title":"Filtering false alarms of buffer overflow analysis using SMT solvers. Inf. Softw. Technol. 52, 2","author":"Kim Youil","year":"2010","unstructured":"Youil Kim , Jooyong Lee , Hwansoo Han , and Kwang-Moo Choe . 2010. Filtering false alarms of buffer overflow analysis using SMT solvers. Inf. Softw. Technol. 52, 2 ( 2010 ). Youil Kim, Jooyong Lee, Hwansoo Han, and Kwang-Moo Choe. 2010. Filtering false alarms of buffer overflow analysis using SMT solvers. Inf. Softw. Technol. 52, 2 (2010)."},{"key":"e_1_3_2_1_45_1","volume-title":"Jakstab: A Static Analysis Platform for Binaries. In Computer Aided Verification.","author":"Kinder Johannes","year":"2008","unstructured":"Johannes Kinder and Helmut Veith . 2008 . Jakstab: A Static Analysis Platform for Binaries. In Computer Aided Verification. Johannes Kinder and Helmut Veith. 2008. Jakstab: A Static Analysis Platform for Binaries. In Computer Aided Verification."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Johannes Kinder Helmut Veith and Florian Zuleger. 2009. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. In Verification Model Checking and Abstract Interpretation.  Johannes Kinder Helmut Veith and Florian Zuleger. 2009. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. In Verification Model Checking and Abstract Interpretation.","DOI":"10.1007\/978-3-540-93900-9_19"},{"key":"e_1_3_2_1_47_1","unstructured":"Andy King and Harald S\u00f8ndergaard. 2008. Inferring Congruence Equations Using SAT. In Computer Aided Verification.  Andy King and Harald S\u00f8ndergaard. 2008. Inferring Congruence Equations Using SAT. In Computer Aided Verification."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Andy King and Harald S\u00f8ndergaard. 2010. Automatic Abstraction for Congruences. In Verification Model Checking and Abstract Interpretation.  Andy King and Harald S\u00f8ndergaard. 2010. Automatic Abstraction for Congruences. In Verification Model Checking and Abstract Interpretation.","DOI":"10.1007\/978-3-642-11319-2_16"},{"key":"e_1_3_2_1_49_1","volume-title":"Frama-C: A Software Analysis Perspective. Form. Asp. Comput. 27, 3","author":"Kirchner Florent","year":"2015","unstructured":"Florent Kirchner , Nikolai Kosmatov , Virgile Prevosto , Julien Signoles , and Boris Yakobowski . 2015. Frama-C: A Software Analysis Perspective. Form. Asp. Comput. 27, 3 ( 2015 ). Florent Kirchner, Nikolai Kosmatov, Virgile Prevosto, Julien Signoles, and Boris Yakobowski. 2015. Frama-C: A Software Analysis Perspective. Form. Asp. Comput. 27, 3 (2015)."},{"key":"e_1_3_2_1_50_1","volume-title":"TIE: Principled Reverse Engineering of Types in Binary Programs. In Network and Distributed System Security Symposium.","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee , Thanassis Avgerinos , and David Brumley . 2011 . TIE: Principled Reverse Engineering of Types in Binary Programs. In Network and Distributed System Security Symposium. JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled Reverse Engineering of Types in Binary Programs. In Network and Distributed System Security Symposium."},{"volume-title":"KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. In Network and Distributed System Security Symposium.","author":"Liu C.","key":"e_1_3_2_1_51_1","unstructured":"C. Liu , Y. Chen , and L. Lu . 2021 . KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. In Network and Distributed System Security Symposium. C. Liu, Y. Chen, and L. Lu. 2021. KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_52_1","volume-title":"Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes. In Verification, Model Checking, and Abstract Interpretation.","author":"Logozzo Francesco","year":"2007","unstructured":"Francesco Logozzo . 2007 . Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes. In Verification, Model Checking, and Abstract Interpretation. Francesco Logozzo. 2007. Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes. In Verification, Model Checking, and Abstract Interpretation."},{"volume-title":"Program Slicing and Polytope Models. In International Symposium on Code Generation and Optimization.","author":"Lokuciejewski Paul","key":"e_1_3_2_1_53_1","unstructured":"Paul Lokuciejewski , D. Cordes , H. Falk , and P. Marwedel . 2009. A Fast and Precise Static Loop Analysis Based on Abstract Interpretation , Program Slicing and Polytope Models. In International Symposium on Code Generation and Optimization. Paul Lokuciejewski, D. Cordes, H. Falk, and P. Marwedel. 2009. A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models. In International Symposium on Code Generation and Optimization."},{"key":"e_1_3_2_1_54_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Lyu Yunlong","year":"2022","unstructured":"Yunlong Lyu , Yi Fang , Yiwei Zhang , Qibin Sun , Siqi Ma , Elisa Bertino , Kangjie Lu , and Juanru Li . 2022 . Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis . In IEEE Symposium on Security and Privacy. Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, and Juanru Li. 2022. Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Ravi Mangal Mayur Naik and Hongseok Yang. 2014. A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join. In Programming Languages and Systems.  Ravi Mangal Mayur Naik and Hongseok Yang. 2014. A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join. In Programming Languages and Systems.","DOI":"10.1007\/978-3-642-54833-8_27"},{"key":"e_1_3_2_1_56_1","volume-title":"ASIA Conference on Computer and Communications Security.","author":"Mantovani Alessandro","year":"2022","unstructured":"Alessandro Mantovani , Luca Compagna , Yan Shoshitaishvili , and Davide Balzarotti . 2022 . The Convergence of Source Code and Binary Vulnerability Discovery \u2013 A Case Study . In ASIA Conference on Computer and Communications Security. Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, and Davide Balzarotti. 2022. The Convergence of Source Code and Binary Vulnerability Discovery \u2013 A Case Study. In ASIA Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_57_1","volume-title":"2015 International Conference on Embedded Software.","author":"Min\u00e9 Antoine","year":"2015","unstructured":"Antoine Min\u00e9 and David Delmas . 2015 . Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics software . In 2015 International Conference on Embedded Software. Antoine Min\u00e9 and David Delmas. 2015. Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics software. In 2015 International Conference on Embedded Software."},{"key":"e_1_3_2_1_58_1","unstructured":"MITRE. 2021. 2021 CWE Top 25 Most Dangerous Software Weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html  MITRE. 2021. 2021 CWE Top 25 Most Dangerous Software Weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html"},{"key":"e_1_3_2_1_59_1","volume-title":"USENIX Security Symposium.","author":"Molnar David","year":"2009","unstructured":"David Molnar , Xue\u00a0Cong Li , and David\u00a0 A. Wagner . 2009 . Dynamic Test Generation to Find Integer Bugs in X86 Binary Linux Programs . In USENIX Security Symposium. David Molnar, Xue\u00a0Cong Li, and David\u00a0A. Wagner. 2009. Dynamic Test Generation to Find Integer Bugs in X86 Binary Linux Programs. In USENIX Security Symposium."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Ramon\u00a0E Moore R\u00a0Baker Kearfott and Michael\u00a0J Cloud. 2009. Introduction to interval analysis.  Ramon\u00a0E Moore R\u00a0Baker Kearfott and Michael\u00a0J Cloud. 2009. Introduction to interval analysis.","DOI":"10.1137\/1.9780898717716"},{"key":"e_1_3_2_1_61_1","volume-title":"Analysis of Modular Arithmetic. In European Symposium on Programming.","author":"M\u00fcller-Olm Markus","year":"2005","unstructured":"Markus M\u00fcller-Olm and Helmut Seidl . 2005 . Analysis of Modular Arithmetic. In European Symposium on Programming. Markus M\u00fcller-Olm and Helmut Seidl. 2005. Analysis of Modular Arithmetic. In European Symposium on Programming."},{"key":"e_1_3_2_1_62_1","volume-title":"IntRepair: Informed Repairing of Integer Overflows. In International Conference on Software Engineering.","author":"Muntean Paul","year":"2020","unstructured":"Paul Muntean , Martin Monperrus , Hao Sun , Jens Grossklags , and Claudia Eckert . 2020 . IntRepair: Informed Repairing of Integer Overflows. In International Conference on Software Engineering. Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, and Claudia Eckert. 2020. IntRepair: Informed Repairing of Integer Overflows. In International Conference on Software Engineering."},{"volume-title":"Principles of Program Analysis","author":"Nielson Flemming","key":"e_1_3_2_1_63_1","unstructured":"Flemming Nielson , Hanne\u00a0Riis Nielson , and Chris Hankin . 1999. Principles of Program Analysis . Springer . Flemming Nielson, Hanne\u00a0Riis Nielson, and Chris Hankin. 1999. Principles of Program Analysis. Springer."},{"key":"e_1_3_2_1_64_1","volume-title":"The origins of structural operational semantics. J. Log. and Algebraic Programming 60-61","author":"Plotkin D.","year":"2004","unstructured":"Gordon\u00a0 D. Plotkin . 2004. The origins of structural operational semantics. J. Log. and Algebraic Programming 60-61 ( 2004 ). Gordon\u00a0D. Plotkin. 2004. The origins of structural operational semantics. J. Log. and Algebraic Programming 60-61 (2004)."},{"key":"e_1_3_2_1_65_1","volume-title":"IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking. In Annual Computer Security Applications Conference.","author":"Pomonis Marios","year":"2014","unstructured":"Marios Pomonis , Theofilos Petsios , Kangkook Jee , Michalis Polychronakis , and Angelos\u00a0 D. Keromytis . 2014 . IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking. In Annual Computer Security Applications Conference. Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, and Angelos\u00a0D. Keromytis. 2014. IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking. In Annual Computer Security Applications Conference."},{"key":"e_1_3_2_1_66_1","volume-title":"Finding Buffer Overflow Inducing Loops in Binary Executables. In International Conference on Software Security and Reliability.","author":"Rawat Sanjay","year":"2012","unstructured":"Sanjay Rawat and Laurent Mounier . 2012 . Finding Buffer Overflow Inducing Loops in Binary Executables. In International Conference on Software Security and Reliability. Sanjay Rawat and Laurent Mounier. 2012. Finding Buffer Overflow Inducing Loops in Binary Executables. In International Conference on Software Security and Reliability."},{"key":"e_1_3_2_1_67_1","volume-title":"Annual International Symposium on Microarchitecture.","author":"Razdan Rahul","year":"1994","unstructured":"Rahul Razdan and Michael\u00a0 D. Smith . 1994 . A High-Performance Microarchitecture with Hardware-Programmable Functional Units . In Annual International Symposium on Microarchitecture. Rahul Razdan and Michael\u00a0D. Smith. 1994. A High-Performance Microarchitecture with Hardware-Programmable Functional Units. In Annual International Symposium on Microarchitecture."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_23"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159974.1134657"},{"key":"e_1_3_2_1_70_1","volume-title":"HOIST: A System for Automatically Deriving Static Analyzers for Embedded Systems. In International Conference on Architectural Support for Programming Languages and Operating Systems.","author":"Regehr John","year":"2004","unstructured":"John Regehr and Alastair Reid . 2004 . HOIST: A System for Automatically Deriving Static Analyzers for Embedded Systems. In International Conference on Architectural Support for Programming Languages and Operating Systems. John Regehr and Alastair Reid. 2004. HOIST: A System for Automatically Deriving Static Analyzers for Embedded Systems. In International Conference on Architectural Support for Programming Languages and Operating Systems."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"John Regehr Alastair Reid and Kirk Webb. 2003. Eliminating Stack Overflow by Abstract Interpretation. In Embedded Software.  John Regehr Alastair Reid and Kirk Webb. 2003. Eliminating Stack Overflow by Abstract Interpretation. In Embedded Software.","DOI":"10.1007\/978-3-540-45212-6_20"},{"key":"e_1_3_2_1_72_1","first-page":"4","article-title":"Eliminating Stack Overflow by Abstract Interpretation","volume":"4","author":"Regehr John","year":"2005","unstructured":"John Regehr , Alastair Reid , and Kirk Webb . 2005 . Eliminating Stack Overflow by Abstract Interpretation . ACM Trans. Embed. Comput. Syst. 4 , 4 (nov 2005). John Regehr, Alastair Reid, and Kirk Webb. 2005. Eliminating Stack Overflow by Abstract Interpretation. ACM Trans. Embed. Comput. Syst. 4, 4 (nov 2005).","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"e_1_3_2_1_73_1","volume-title":"International Symposium on Code Generation and Optimization.","author":"Rodrigues Raphael\u00a0Ernani","year":"2013","unstructured":"Raphael\u00a0Ernani Rodrigues , Victor\u00a0Hugo Sperle Campos , and Fernando\u00a0Magno Quint\u00e3o Pereira . 2013 . A fast and low-overhead technique to secure programs against integer overflows . In International Symposium on Code Generation and Optimization. Raphael\u00a0Ernani Rodrigues, Victor\u00a0Hugo Sperle Campos, and Fernando\u00a0Magno Quint\u00e3o Pereira. 2013. A fast and low-overhead technique to secure programs against integer overflows. In International Symposium on Code Generation and Optimization."},{"key":"e_1_3_2_1_74_1","volume-title":"International Conference on Compiler Construction.","author":"Rountev Atanas","year":"2008","unstructured":"Atanas Rountev , Mariana Sharp , and Guoqing Xu . 2008 . IDE dataflow analysis in the presence of large object-oriented libraries . In International Conference on Compiler Construction. Atanas Rountev, Mariana Sharp, and Guoqing Xu. 2008. IDE dataflow analysis in the presence of large object-oriented libraries. In International Conference on Compiler Construction."},{"key":"e_1_3_2_1_75_1","volume-title":"ACM SIGPLAN Conference on Programming Language Design and Implementation.","author":"Rugina Radu","year":"2000","unstructured":"Radu Rugina and Martin Rinard . 2000 . Symbolic Bounds Analysis of Pointers, Array Indices, and Accessed Memory Regions . In ACM SIGPLAN Conference on Programming Language Design and Implementation. Radu Rugina and Martin Rinard. 2000. Symbolic Bounds Analysis of Pointers, Array Indices, and Accessed Memory Regions. In ACM SIGPLAN Conference on Programming Language Design and Implementation."},{"volume-title":"Two approaches to interprocedural data flow analysis","author":"Sharir Micha","key":"e_1_3_2_1_76_1","unstructured":"Micha Sharir and Amir Pnueli . 1978. Two approaches to interprocedural data flow analysis . New York University . Micha Sharir and Amir Pnueli. 1978. Two approaches to interprocedural data flow analysis. New York University."},{"key":"e_1_3_2_1_77_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems.","author":"Sidiroglou-Douskos Stelios","year":"2015","unstructured":"Stelios Sidiroglou-Douskos , Eric Lahtinen , Nathan Rittenhouse , Paolo Piselli , Fan Long , Deokhwan Kim , and Martin Rinard . 2015 . Targeted automatic integer overflow discovery using goal-directed conditional branch enforcement . In International Conference on Architectural Support for Programming Languages and Operating Systems. Stelios Sidiroglou-Douskos, Eric Lahtinen, Nathan Rittenhouse, Paolo Piselli, Fan Long, Deokhwan Kim, and Martin Rinard. 2015. Targeted automatic integer overflow discovery using goal-directed conditional branch enforcement. In International Conference on Architectural Support for Programming Languages and Operating Systems."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Dawn Song David Brumley Heng Yin Juan Caballero Ivan Jager Min\u00a0Gyung Kang Zhenkai Liang James Newsome Pongsin Poosankam and Prateek Saxena. 2008. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Information Systems Security.  Dawn Song David Brumley Heng Yin Juan Caballero Ivan Jager Min\u00a0Gyung Kang Zhenkai Liang James Newsome Pongsin Poosankam and Prateek Saxena. 2008. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Information Systems Security.","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_79_1","volume-title":"International Workshop on Worst-Case Execution Time Analysis.","author":"Souyris Jean","year":"2007","unstructured":"Jean Souyris , Erwan\u00a0Le Pavec , Guillaume Himbert , Guillaume Borios , Victor J\u00e9gu , and Reinhold Heckmann . 2007 . Computing the Worst Case Execution Time of an Avionics Program by Abstract Interpretation . In International Workshop on Worst-Case Execution Time Analysis. Jean Souyris, Erwan\u00a0Le Pavec, Guillaume Himbert, Guillaume Borios, Victor J\u00e9gu, and Reinhold Heckmann. 2007. Computing the Worst Case Execution Time of an Avionics Program by Abstract Interpretation. In International Workshop on Worst-Case Execution Time Analysis."},{"key":"e_1_3_2_1_80_1","unstructured":"Zhendong Su and David Wagner. 2004. A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. In Tools and Algorithms for the Construction and Analysis of Systems.  Zhendong Su and David Wagner. 2004. A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. In Tools and Algorithms for the Construction and Analysis of Systems."},{"key":"e_1_3_2_1_81_1","volume-title":"International Conference on Software Engineering.","author":"Sun Hao","year":"2016","unstructured":"Hao Sun , Xiangyu Zhang , Yunhui Zheng , and Qingkai Zeng . 2016 . IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking across Multiple Precisions . In International Conference on Software Engineering. Hao Sun, Xiangyu Zhang, Yunhui Zheng, and Qingkai Zeng. 2016. IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking across Multiple Precisions. In International Conference on Software Engineering."},{"key":"e_1_3_2_1_82_1","article-title":"A lattice-theoretical fixpoint theorem and its applications","volume":"5","author":"Tarski Alfred","year":"1955","unstructured":"Alfred Tarski . 1955 . A lattice-theoretical fixpoint theorem and its applications . Pac. J. Mat. 5 , 2 (1955). Alfred Tarski. 1955. A lattice-theoretical fixpoint theorem and its applications. Pac. J. Mat. 5, 2 (1955).","journal-title":"Pac. J. Mat."},{"key":"e_1_3_2_1_83_1","volume-title":"International Conference on Dependable Systems and Networks.","author":"Thesing Stephan","year":"2003","unstructured":"Stephan Thesing , Jean Souyris , Reinhold Heckmann , Famantanantsoa Randimbivololona , Marc Langenbach , Reinhard Wilhelm , and Christian Ferdinand . 2003 . An abstract interpretation-based timing validation of hard real-time avionics software . In International Conference on Dependable Systems and Networks. Stephan Thesing, Jean Souyris, Reinhold Heckmann, Famantanantsoa Randimbivololona, Marc Langenbach, Reinhard Wilhelm, and Christian Ferdinand. 2003. An abstract interpretation-based timing validation of hard real-time avionics software. In International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_84_1","volume-title":"Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. In USENIX Security Symposium.","author":"Vadayath Jayakrishna","year":"2022","unstructured":"Jayakrishna Vadayath , Moritz Eckert , Kyle Zeng , Nicolaas Weideman , Gokulkrishna\u00a0Praveen Menon , Yanick Fratantonio , Davide Balzarotti , Adam Doup\u00e9 , Tiffany Bao , Ruoyu Wang , Christophe Hauser , and Yan Shoshitaishvili . 2022 . Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. In USENIX Security Symposium. Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna\u00a0Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doup\u00e9, Tiffany Bao, Ruoyu Wang, Christophe Hauser, and Yan Shoshitaishvili. 2022. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. In USENIX Security Symposium."},{"key":"e_1_3_2_1_85_1","volume-title":"Static Race Detection for Device Drivers: The Goblint Approach. In IEEE\/ACM International Conference on Automated Software Engineering.","author":"Vojdani Vesal","year":"2016","unstructured":"Vesal Vojdani , Kalmer Apinis , Vootele R\u00a0otov , Helmut Seidl , Varmo Vene , and Ralf Vogler . 2016 . Static Race Detection for Device Drivers: The Goblint Approach. In IEEE\/ACM International Conference on Automated Software Engineering. Vesal Vojdani, Kalmer Apinis, Vootele R\u00a0otov, Helmut Seidl, Varmo Vene, and Ralf Vogler. 2016. Static Race Detection for Device Drivers: The Goblint Approach. In IEEE\/ACM International Conference on Automated Software Engineering."},{"key":"e_1_3_2_1_86_1","volume-title":"International Conference on Security and Cryptography.","author":"Wagner Andreas","year":"2014","unstructured":"Andreas Wagner and Johannes Sametinger . 2014 . Using the Juliet test suite to compare static security scanners . In International Conference on Security and Cryptography. Andreas Wagner and Johannes Sametinger. 2014. Using the Juliet test suite to compare static security scanners. In International Conference on Security and Cryptography."},{"key":"e_1_3_2_1_87_1","volume-title":"ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Wang Haijun","year":"2019","unstructured":"Haijun Wang , Xiaofei Xie , Shang-Wei Lin , Yun Lin , Yuekang Li , Shengchao Qin , Yang Liu , and Ting Liu . 2019 . Locating Vulnerabilities in Binaries via Memory Layout Recovering . In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Haijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu, and Ting Liu. 2019. Locating Vulnerabilities in Binaries via Memory Layout Recovering. In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering."},{"key":"e_1_3_2_1_88_1","volume-title":"USENIX Security Symposium.","author":"Wang Shuai","year":"2019","unstructured":"Shuai Wang , Yuyan Bao , Xiao Liu , Pei Wang , Danfeng Zhang , and Dinghao Wu . 2019 . Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation . In USENIX Security Symposium. Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. In USENIX Security Symposium."},{"key":"e_1_3_2_1_89_1","volume-title":"IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In Network and Distributed System Security Symposium.","author":"Wang Tielei","year":"2009","unstructured":"Tielei Wang , Tao Wei , Zhiqiang Lin , and Wei Zou . 2009 . IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In Network and Distributed System Security Symposium. Tielei Wang, Tao Wei, Zhiqiang Lin, and Wei Zou. 2009. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_90_1","volume-title":"Improving Integer Security for Systems with KINT. In USENIX Symposium on Operating Systems Design and Implementation.","author":"Wang Xi","year":"2012","unstructured":"Xi Wang , Haogang Chen , Zhihao Jia , Nickolai Zeldovich , and M.\u00a0 Frans Kaashoek . 2012 . Improving Integer Security for Systems with KINT. In USENIX Symposium on Operating Systems Design and Implementation. Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, and M.\u00a0Frans Kaashoek. 2012. Improving Integer Security for Systems with KINT. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_91_1","unstructured":"Reinhard Wilhelm and Bj\u00f6rn Wachter. 2008. Abstract Interpretation with Applications to Timing Validation.  Reinhard Wilhelm and Bj\u00f6rn Wachter. 2008. Abstract Interpretation with Applications to Timing Validation."},{"key":"e_1_3_2_1_92_1","volume-title":"22nd Chaos Communication Congress.","author":"Wojtczuk Rafal","year":"2005","unstructured":"Rafal Wojtczuk . 2005 . UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries . In 22nd Chaos Communication Congress. Rafal Wojtczuk. 2005. UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries. In 22nd Chaos Communication Congress."},{"key":"e_1_3_2_1_93_1","article-title":"Type Learning for Binaries and Its Applications","volume":"68","author":"Xu Zhiwu","year":"2019","unstructured":"Zhiwu Xu , Cheng Wen , and Shengchao Qin . 2019 . Type Learning for Binaries and Its Applications . IEEE Trans. Rel. 68 , 3 (2019). Zhiwu Xu, Cheng Wen, and Shengchao Qin. 2019. Type Learning for Binaries and Its Applications. IEEE Trans. Rel. 68, 3 (2019).","journal-title":"IEEE Trans. Rel."},{"key":"e_1_3_2_1_94_1","unstructured":"Qiuchen Yan and Stephen McCamant. 2019. Conservative Signed\/Unsigned Type Inference for Binaries using Minimum Cut. University of Minnesota.  Qiuchen Yan and Stephen McCamant. 2019. Conservative Signed\/Unsigned Type Inference for Binaries using Minimum Cut. University of Minnesota."},{"key":"e_1_3_2_1_95_1","volume-title":"IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing.","author":"Zhang Bin","year":"2016","unstructured":"Bin Zhang , Chao Feng , Bo Wu , and Chaojing Tang . 2016 . Detecting integer overflow in Windows binary executables based on symbolic execution . In IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing. Bin Zhang, Chao Feng, Bo Wu, and Chaojing Tang. 2016. Detecting integer overflow in Windows binary executables based on symbolic execution. In IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing."},{"key":"e_1_3_2_1_96_1","volume-title":"European Symposium on Research in Computer Security.","author":"Zhang Chao","year":"2010","unstructured":"Chao Zhang , Tielei Wang , Tao Wei , Yu Chen , and Wei Zou . 2010 . IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time . In European Symposium on Research in Computer Security. Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, and Wei Zou. 2010. IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time. In European Symposium on Research in Computer Security."},{"key":"e_1_3_2_1_97_1","volume-title":"Hybrid Top-down and Bottom-up Interprocedural Analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation.","author":"Zhang Xin","year":"2014","unstructured":"Xin Zhang , Ravi Mangal , Mayur Naik , and Hongseok Yang . 2014 . Hybrid Top-down and Bottom-up Interprocedural Analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation. Xin Zhang, Ravi Mangal, Mayur Naik, and Hongseok Yang. 2014. Hybrid Top-down and Bottom-up Interprocedural Analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation."},{"key":"e_1_3_2_1_98_1","volume-title":"Improving Accuracy of Static Integer Overflow Detection in Binary. In International Symposium on Research in Attacks, Intrusions and Defenses.","author":"Zhang Yang","year":"2015","unstructured":"Yang Zhang , Xiaoshan Sun , Yi Deng , Liang Cheng , Shuke Zeng , Yu Fu , and Dengguo Feng . 2015 . Improving Accuracy of Static Integer Overflow Detection in Binary. In International Symposium on Research in Attacks, Intrusions and Defenses. Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, and Dengguo Feng. 2015. Improving Accuracy of Static Integer Overflow Detection in Binary. In International Symposium on Research in Attacks, Intrusions and Defenses."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:27Z","timestamp":1750182687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":98,"alternative-id":["10.1145\/3579856.3582814","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582814","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}