{"id":"https://openalex.org/W2919283721","doi":"https://doi.org/10.1109/tencon.2018.8650188","title":"Assisting Vulnerability Detection by Prioritizing Crashes with Incremental Learning","display_name":"Assisting Vulnerability Detection by Prioritizing Crashes with Incremental Learning","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2919283721","doi":"https://doi.org/10.1109/tencon.2018.8650188","mag":"2919283721"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650188","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425431","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0001-7293-8119"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Li Zhang","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040321131","display_name":"Vrizlynn L. L. Thing","orcid":"https://orcid.org/0000-0003-4424-8596"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vrizlynn L. L. Thing","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100425431"],"corresponding_institution_ids":["https://openalex.org/I115228651","https://openalex.org/I3005327000"],"apc_list":null,"apc_paid":null,"fwci":0.1651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.49764636,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"2080","last_page":"2085"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8437181115150452},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.6341102123260498},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6327166557312012},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5021135807037354},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.4954901933670044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4887940585613251},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4666573703289032},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.4563392698764801},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.45253145694732666},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4368566572666168},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4165910482406616},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4123593866825104},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3998841941356659},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3757527768611908},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10177984833717346}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8437181115150452},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.6341102123260498},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6327166557312012},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5021135807037354},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.4954901933670044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4887940585613251},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4666573703289032},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.4563392698764801},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.45253145694732666},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4368566572666168},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4165910482406616},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4123593866825104},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3998841941356659},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3757527768611908},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10177984833717346}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650188","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320321594","display_name":"Consejo Nacional de Investigaciones Cient\u00edficas y T\u00e9cnicas","ror":"https://ror.org/03cqe8w59"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W133470593","https://openalex.org/W157156687","https://openalex.org/W1533946607","https://openalex.org/W1590183771","https://openalex.org/W1971733255","https://openalex.org/W1988524530","https://openalex.org/W2002934700","https://openalex.org/W2028870622","https://openalex.org/W2051990174","https://openalex.org/W2070996757","https://openalex.org/W2101234009","https://openalex.org/W2119251836","https://openalex.org/W2135200607","https://openalex.org/W2145302217","https://openalex.org/W2160218441","https://openalex.org/W2181649971","https://openalex.org/W2297419069","https://openalex.org/W2300544701","https://openalex.org/W2520208674","https://openalex.org/W2535617737","https://openalex.org/W2748690817","https://openalex.org/W2775532270","https://openalex.org/W2777046235","https://openalex.org/W2792995802","https://openalex.org/W2794283311","https://openalex.org/W2795170942","https://openalex.org/W3009009611","https://openalex.org/W6605468800","https://openalex.org/W6606430823","https://openalex.org/W6632118081","https://openalex.org/W6675354045","https://openalex.org/W6677495220","https://openalex.org/W6683584131","https://openalex.org/W6685624694","https://openalex.org/W6726812850"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W3203597304","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W4248424560","https://openalex.org/W3023977444","https://openalex.org/W4399336006","https://openalex.org/W2898010850","https://openalex.org/W3207576119"],"abstract_inverted_index":{"The":[0,128,142],"proliferation":[1],"of":[2,4,14,18,54,66,104,114,161,196],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7],"is":[8,40,118],"accompanied":[9],"by":[10,35,146],"the":[11,15,19,55,61,89,94,102,110,139,147,151,165,200,208],"tremendous":[12],"increase":[13],"attack":[16],"surface":[17],"networked":[20],"embedded":[21],"systems.":[22],"Software":[23],"vulnerabilities":[24],"in":[25,198],"these":[26],"systems":[27],"become":[28],"easier":[29],"than":[30,207],"ever":[31],"to":[32,44,92,96,133,137,169],"be":[33,97,170],"exploited":[34],"cybercriminals.":[36],"Although":[37],"fuzz":[38],"testing":[39],"an":[41,134,190],"effective":[42],"technique":[43],"detect":[45],"memory":[46],"corruption":[47],"induced":[48],"vulnerabilities,":[49],"it":[50],"requires":[51],"in-depth":[52],"analysis":[53,124],"typically":[56],"massive":[57],"crashes,":[58],"which":[59,87],"impedes":[60],"in-time":[62],"identification":[63],"and":[64,99,125,163,180,203],"patching":[65],"potentially":[67],"disastrous":[68],"vulnerabilities.":[69,105],"In":[70],"this":[71],"paper,":[72],"we":[73],"present":[74],"a":[75,158],"new":[76,173],"approach":[77],"that":[78,185],"can":[79,188],"efficiently":[80],"classify":[81],"crashes":[82,95,162,179,183,202],"based":[83,121],"on":[84,122,176],"their":[85],"exploitability,":[86],"facilitates":[88],"human":[90],"analysts":[91],"prioritize":[93],"examined":[98],"hence":[100],"accelerate":[101],"discovery":[103],"A":[106],"compact":[107],"fingerprint":[108],"for":[109,157,172],"dynamic":[111],"execution":[112],"trace":[113],"each":[115],"crashing":[116],"input":[117],"firstly":[119],"generated":[120],"n-gram":[123],"feature":[126],"hashing.":[127],"fingerprints":[129],"are":[130],"then":[131],"fed":[132],"online":[135,148],"classifier":[136,149],"build":[138],"distinguishing":[140],"model.":[141],"incremental":[143],"learning":[144],"enabled":[145],"makes":[150],"built":[152],"model":[153],"scale":[154],"well":[155],"even":[156],"large":[159],"amount":[160],"at":[164],"same":[166],"time":[167],"easy":[168],"updated":[171],"crashes.":[174],"Experiments":[175],"4,392":[177],"exploitable":[178,201],"33,934":[181],"non-exploitable":[182],"show":[184],"our":[186],"method":[187],"achieve":[189],"F":[191],"<sub":[192],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[193],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[194],"-score":[195],"95%":[197],"detecting":[199],"significantly":[204],"better":[205],"accuracy":[206],"popular":[209],"crash":[210],"classification":[211],"tool":[212],"!exploitable.":[213]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
