{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T08:52:19Z","timestamp":1744188739400},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.23919\/icact48636.2020.9061281","type":"proceedings-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T04:06:01Z","timestamp":1586491561000},"page":"171-175","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of software weakness detection of CBMC based on CWE"],"prefix":"10.23919","author":[{"given":"Minjae","family":"Byun","sequence":"first","affiliation":[]},{"given":"Yongjun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jin-Young","family":"Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0044-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_16"},{"key":"ref12","first-page":"168","article-title":"Uqbtng: A tool capable of automatically finding integer overflows in win32 binaries","author":"wojtczuk","year":"2005","journal-title":"22nd Chaos Communication Congress"},{"key":"ref13","first-page":"678","article-title":"Practical detection of entropy loss in pseudorandom number generators","author":"d\u00f6rre","year":"0","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2858402"},{"journal-title":"Cwe view Weaknesses in the 2019 cwe top 25 most dangerous software errors","year":"0","key":"ref15"},{"journal-title":"Juliet","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_26"},{"journal-title":"Introduction to cbmc","year":"0","key":"ref18"},{"journal-title":"Cprover manual","year":"0","author":"kroening","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34878-0_18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"ref8","article-title":"Survey of existing tools for formal verification","author":"armstrong","year":"2014","journal-title":"Sandia Report SAND2013&#x2013;0537"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.39"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2010.5601288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5220\/0005032902440252"},{"journal-title":"Using the windows headers","year":"0","key":"ref22"},{"journal-title":"Cwe view Research concepts","year":"0","key":"ref21"}],"event":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2020,2,16]]},"location":"Phoenix Park, PyeongChang,, Korea (South)","end":{"date-parts":[[2020,2,19]]}},"container-title":["2020 22nd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9046057\/9061230\/09061281.pdf?arnumber=9061281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:38:19Z","timestamp":1589243899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9061281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/icact48636.2020.9061281","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}