{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:20Z","timestamp":1763507720840},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/compsac.2017.70","type":"proceedings-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T16:50:36Z","timestamp":1505148636000},"page":"614-623","source":"Crossref","is-referenced-by-count":8,"title":["Automated Crash Filtering Using Interprocedural Static Analysis for Binary Codes"],"prefix":"10.1109","author":[{"given":"Hyeon-Gu","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Seong-Kyun","family":"Mok","sequence":"additional","affiliation":[]},{"given":"Eun-Sun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"jedutton libbeuty","year":"0","key":"ref39"},{"journal-title":"RTL Representation","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"journal-title":"Hancom Office","year":"0","key":"ref30"},{"journal-title":"Valgrind Technical Documentation","year":"0","key":"ref37"},{"journal-title":"Hex-Rays","year":"0","key":"ref36"},{"journal-title":"Tiny Code Generator (TCG)","year":"0","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.74"},{"journal-title":"IDA About","year":"0","key":"ref10"},{"journal-title":"Dagger Decompiling Software Through LLVM by M Larabel","year":"0","key":"ref40"},{"journal-title":"REIL-The Reverse Engineering Intermediate Language","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3745\/KTCCS.2013.2.9.399"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22110-1_37","article-title":"BAP: A Binary Analysis Platform","author":"brumley","year":"2011","journal-title":"Proc of International conference on Computer Aided Verification (CAV'11)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5626\/KTCP.2016.22.4.178"},{"journal-title":"CANARIE","year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"journal-title":"Polaris","year":"0","key":"ref18"},{"key":"ref19","article-title":"The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More","author":"howrd","year":"2006","journal-title":"Secure Software (Developer Best Practices)"},{"key":"ref28","article-title":"Statically Detecting Use After Free on Binary Code","author":"feist","year":"2013","journal-title":"GreHack"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref27","article-title":"WYSINWYX: What you see is not what you eXecute","author":"balakrishnan","year":"2009","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"journal-title":"CVE-2014-0322 Common Vulnerabilities and Exposures","year":"0","key":"ref3"},{"key":"ref6","article-title":"Crash analysis with BitBlaze","author":"miller","year":"0","journal-title":"BlackHat white paper"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"ref5","first-page":"403","author":"li","year":"2013","journal-title":"Dynamic Analysis and Debugging of Binary Code for Security Applications Runtime Verification (RV) Lecture Notes in Computer Science Volume 8174"},{"key":"ref8","article-title":"Automated Whitebox Fuzz Testing","author":"godefroid","year":"2008","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"year":"0","author":"fuzzer","key":"ref7"},{"journal-title":"CVE-2010-1807 Common Vulnerabilities and Exposures","year":"0","key":"ref2"},{"journal-title":"Zynamics BinNavi","year":"0","key":"ref9"},{"journal-title":"!Exploitable Crash Analyzer-MSEC Debugger Extensions","year":"0","key":"ref1"},{"key":"ref20","article-title":"A Comparison of Buffer Overflow Prevention Implementations and Weaknesses","author":"silberman","year":"2004","journal-title":"Technical whitepaper iDEFENSE Labs"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.20"},{"journal-title":"Accessing CrashWrangler to analyze crashes for security implications","year":"0","key":"ref21"},{"key":"ref42","article-title":"FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps","author":"arzt","year":"2014","journal-title":"PLDI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"ref41","article-title":"TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones","author":"ench","year":"2010","journal-title":"USENIX OSDI"},{"journal-title":"EXCEPTION_ RECORD structure","year":"0","key":"ref23"},{"key":"ref44","article-title":"Triaging crashes with backward taint analysis for arm architecture","author":"kim","year":"2015","journal-title":"Black Hat Europe'06"},{"key":"ref26","first-page":"845","article-title":"ByteWeight: Leraning to Recognize Functions in Binary Code","author":"bao","year":"0","journal-title":"Proceedings of the 23rd USENIX Security Symposium 2014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2015.05.002"},{"journal-title":"Compilers Principles Techniques and Tools","year":"2006","author":"aho","key":"ref25"}],"event":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","start":{"date-parts":[[2017,7,4]]},"location":"Turin","end":{"date-parts":[[2017,7,8]]}},"container-title":["2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8027037\/8029571\/08029666.pdf?arnumber=8029666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:08:17Z","timestamp":1570082897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8029666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/compsac.2017.70","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}