{"id":"https://openalex.org/W1965767399","doi":"https://doi.org/10.1109/icsai.2014.7009438","title":"Improving guide-based vulnerability detection with hybrid symbolic execution","display_name":"Improving guide-based vulnerability detection with hybrid symbolic execution","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W1965767399","doi":"https://doi.org/10.1109/icsai.2014.7009438","mag":"1965767399"},"language":"en","primary_location":{"id":"doi:10.1109/icsai.2014.7009438","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2014.7009438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073214607","display_name":"Yongji Ouyang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yongji Ouyang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103082007","display_name":"Shuai Zeng","orcid":"https://orcid.org/0000-0001-7632-427X"},"institutions":[{"id":"https://openalex.org/I4210094879","display_name":"Shandong Institute of Automation","ror":"https://ror.org/00qdtba35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094879","https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Zeng","raw_affiliation_strings":["State Key Laboratory of Management and Control for Complex System Institute of Automation, Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Management and Control for Complex System, Institute of Automation, Chinese Academy of Sciences Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Management and Control for Complex System Institute of Automation, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210094879","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Management and Control for Complex System, Institute of Automation, Chinese Academy of Sciences Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089808102","display_name":"Chao Yang","orcid":"https://orcid.org/0000-0002-6552-3203"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Yang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006029284","display_name":"Qingxian Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qingxian Wang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073214607"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10362243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":"1038","last_page":"1043"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.9499639868736267},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8320833444595337},{"id":"https://openalex.org/keywords/concolic-testing","display_name":"Concolic testing","score":0.7855643033981323},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.6818697452545166},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5992838144302368},{"id":"https://openalex.org/keywords/the-symbolic","display_name":"The Symbolic","score":0.5330076813697815},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.48938411474227905},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4805624783039093},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.41977429389953613},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.4118794798851013},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37132829427719116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18053913116455078}],"concepts":[{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.9499639868736267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8320833444595337},{"id":"https://openalex.org/C11219265","wikidata":"https://www.wikidata.org/wiki/Q5158734","display_name":"Concolic testing","level":4,"score":0.7855643033981323},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.6818697452545166},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5992838144302368},{"id":"https://openalex.org/C2776095079","wikidata":"https://www.wikidata.org/wiki/Q489538","display_name":"The Symbolic","level":2,"score":0.5330076813697815},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48938411474227905},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4805624783039093},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.41977429389953613},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.4118794798851013},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37132829427719116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18053913116455078},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsai.2014.7009438","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2014.7009438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W17195072","https://openalex.org/W154245331","https://openalex.org/W1480909796","https://openalex.org/W1507845365","https://openalex.org/W1548806133","https://openalex.org/W1710734607","https://openalex.org/W1976878954","https://openalex.org/W1988524530","https://openalex.org/W2042033151","https://openalex.org/W2080970633","https://openalex.org/W2116998907","https://openalex.org/W2133612077","https://openalex.org/W2134633067","https://openalex.org/W2137530017","https://openalex.org/W2495127127","https://openalex.org/W3160978791","https://openalex.org/W4239813889","https://openalex.org/W4244700344","https://openalex.org/W4301702567","https://openalex.org/W6606213487","https://openalex.org/W6630124987","https://openalex.org/W6632680784","https://openalex.org/W6637688222","https://openalex.org/W7033186086"],"related_works":["https://openalex.org/W1983849186","https://openalex.org/W34311366","https://openalex.org/W2553223552","https://openalex.org/W2155539595","https://openalex.org/W844671342","https://openalex.org/W4285245777","https://openalex.org/W2101264565","https://openalex.org/W3141167149","https://openalex.org/W3092374222","https://openalex.org/W4386755271"],"abstract_inverted_index":{"Symbolic":[0],"Execution":[1],"is":[2,77],"a":[3,60,87],"key":[4],"and":[5,29,69,73,85,116,138],"useful":[6],"technology":[7],"in":[8,100],"current":[9],"refinement":[10],"software":[11],"test,":[12],"but":[13],"there":[14],"still":[15],"exists":[16],"some":[17,139],"problems":[18],"such":[19],"as":[20],"space":[21,127],"explosion.":[22,128],"In":[23],"order":[24],"to":[25,50],"mitigate":[26],"this":[27,36,94,121,130],"problem":[28,125],"improve":[30],"the":[31,39,81,124,134],"ability":[32],"for":[33],"detecting":[34],"vulnerabilities,":[35],"paper":[37],"presents":[38],"improving":[40],"guide-based":[41],"vulnerability":[42,78],"detection":[43],"with":[44,59,119],"hybrid":[45,61],"symbolic":[46,62,71,109],"execution,":[47,72],"which":[48,65,103],"aims":[49],"test":[51],"suspicious":[52],"objects.":[53],"This":[54],"method":[55,95,122],"conducts":[56],"path":[57],"traversal":[58],"execution":[63,110],"model,":[64],"alternates":[66],"between":[67],"dynamic":[68],"static":[70],"verify":[74],"whether":[75],"it":[76],"through":[79],"summarizing":[80],"characteristics":[82],"of":[83,126,136],"vulnerabilities":[84,135],"generating":[86],"constraint":[88],"expression.":[89],"Experimental":[90],"result":[91],"shows":[92],"that":[93],"can":[96],"successfully":[97,132],"detect":[98],"errors":[99],"56":[101],"seconds,":[102],"exceeds":[104],"any":[105],"other":[106,140],"modern":[107],"mainstream":[108],"tools":[111],"including":[112],"CUTE,":[113,120],"KLEE,":[114],"S2E":[115],"Cloud9.":[117],"Compared":[118],"alleviates":[123],"Besides,":[129],"papaer":[131],"verifies":[133],"OpenSSL":[137],"commonly":[141],"used":[142],"software.":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
