{"id":"https://openalex.org/W2153934195","doi":"https://doi.org/10.1145/1068009.1068185","title":"Improving network applications security","display_name":"Improving network applications security","publication_year":2005,"publication_date":"2005-06-25","ids":{"openalex":"https://openalex.org/W2153934195","doi":"https://doi.org/10.1145/1068009.1068185","mag":"2153934195"},"language":"en","primary_location":{"id":"doi:10.1145/1068009.1068185","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1068009.1068185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062935676","display_name":"Concettina Del Grosso","orcid":null},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Concettina Del Grosso","raw_affiliation_strings":["University of Sannio, Benevento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018821149","display_name":"Giuliano Antoniol","orcid":"https://orcid.org/0000-0002-7892-9202"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuliano Antoniol","raw_affiliation_strings":["University of Sannio, Benevento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025099559","display_name":"Massimiliano Di Penta","orcid":"https://orcid.org/0000-0002-0340-9747"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Massimiliano Di Penta","raw_affiliation_strings":["University of Sannio, Benevento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Sannio, Benevento, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111540063","display_name":"Philippe Galinier","orcid":null},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Philippe Galinier","raw_affiliation_strings":["\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102966564","display_name":"Ettore Merlo","orcid":"https://orcid.org/0000-0002-1436-6076"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ettore Merlo","raw_affiliation_strings":["\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Polytechnique de Montr\u00e9al, Montr\u00e9al, Canada","institution_ids":["https://openalex.org/I45683168"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062935676"],"corresponding_institution_ids":["https://openalex.org/I16337185"],"apc_list":null,"apc_paid":null,"fwci":3.3418,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.92918686,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1037","last_page":"1043"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.8169295191764832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7995474934577942},{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.7041531801223755},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.6128395199775696},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5842401385307312},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.5785619020462036},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.5135455131530762},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.4779662787914276},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.4287766218185425},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.4279261529445648},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.42723825573921204},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.418204665184021},{"id":"https://openalex.org/keywords/data-flow-analysis","display_name":"Data-flow analysis","score":0.41395899653434753},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3795124590396881},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3418755531311035},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3220348358154297},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.2458944022655487},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24237370491027832},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2350884974002838},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18704169988632202},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.14142131805419922},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1305711567401886}],"concepts":[{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.8169295191764832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7995474934577942},{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.7041531801223755},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.6128395199775696},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5842401385307312},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.5785619020462036},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.5135455131530762},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.4779662787914276},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.4287766218185425},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.4279261529445648},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.42723825573921204},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.418204665184021},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.41395899653434753},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3795124590396881},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3418755531311035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3220348358154297},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.2458944022655487},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24237370491027832},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2350884974002838},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18704169988632202},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.14142131805419922},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1305711567401886},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1068009.1068185","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1068009.1068185","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.polymtl.ca:24224","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/24224/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1535713556","https://openalex.org/W1579850852","https://openalex.org/W1589794141","https://openalex.org/W1639032689","https://openalex.org/W1643278098","https://openalex.org/W2002934700","https://openalex.org/W2056309769","https://openalex.org/W2062791908","https://openalex.org/W2114869486","https://openalex.org/W2120138937","https://openalex.org/W2134198861","https://openalex.org/W2137952932","https://openalex.org/W2145568266","https://openalex.org/W2293624369","https://openalex.org/W2611879056","https://openalex.org/W3023540311","https://openalex.org/W4285719527","https://openalex.org/W4388727850","https://openalex.org/W6632050797"],"related_works":["https://openalex.org/W2346217839","https://openalex.org/W2388410288","https://openalex.org/W1506870877","https://openalex.org/W2008860182","https://openalex.org/W2034103799","https://openalex.org/W2156148660","https://openalex.org/W2781641597","https://openalex.org/W2903341154","https://openalex.org/W4242566119","https://openalex.org/W2914088868"],"abstract_inverted_index":{"Buffer":[0],"overflows":[1],"cause":[2,46],"serious":[3,48],"problems":[4],"in":[5,15,101],"different":[6],"categories":[7],"of":[8,47,129,140,143],"software":[9],"systems.":[10,116],"For":[11],"example,":[12],"if":[13],"present":[14],"network":[16],"or":[17,28,39,86],"security":[18],"applications,":[19],"they":[20,42],"can":[21,43],"be":[22,44],"exploited":[23],"to":[24,30,52,62],"gain":[25],"unauthorized":[26],"grant":[27],"access":[29],"the":[31,45,79,91,95,124,127,132,138,144],"system.":[32],"In":[33],"embedded":[34],"systems,":[35,41],"such":[36,122],"as":[37,123],"avionics":[38],"automotive":[40],"accidents.This":[49],"paper":[50],"proposes":[51],"combine":[53],"static":[54],"analysis":[55,68,77],"and":[56,74,84,110,137],"program":[57,85],"slicing":[58,73],"with":[59],"evolutionary":[60],"testing,":[61],"detect":[63],"buffer":[64,99,135],"overflow":[65,100],"threats.":[66],"Static":[67],"identifies":[69],"vulnerable":[70,130],"statements,":[71,131],"while":[72],"data":[75],"dependency":[76],"identify":[78],"relationship":[80],"between":[81],"these":[82],"statements":[83],"function":[87],"inputs,":[88],"thus":[89],"reducing":[90],"search":[92,96],"space.To":[93],"guide":[94],"towards":[97],"discovering":[98],"this":[102],"work":[103],"we":[104],"define":[105],"three":[106],"multi-objective":[107],"fitness":[108],"functions":[109,118],"compare":[111],"them":[112],"on":[113],"two":[114],"open-source":[115],"These":[117],"account":[119],"for":[120],"terms":[121],"statement":[125],"coverage,":[126],"coverage":[128,139],"distance":[133],"form":[134],"boundaries":[136],"unconstrained":[141],"nodes":[142],"control":[145],"flow":[146],"graph.":[147]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
