{"id":"https://openalex.org/W2147468904","doi":"https://doi.org/10.1145/1315245.1315314","title":"Memsherlock","display_name":"Memsherlock","publication_year":2007,"publication_date":"2007-10-28","ids":{"openalex":"https://openalex.org/W2147468904","doi":"https://doi.org/10.1145/1315245.1315314","mag":"2147468904"},"language":"en","primary_location":{"id":"doi:10.1145/1315245.1315314","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1315245.1315314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023563381","display_name":"Emre C. Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Emre C. Sezer","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016753473","display_name":"Peng Ning","orcid":"https://orcid.org/0000-0002-1455-9919"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Ning","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068310253","display_name":"Chongkyung Kil","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chongkyung Kil","raw_affiliation_strings":["North Carolina State University, Raleigh, NC","North Carolina State University, Raleigh, NC;"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Raleigh, NC;","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050722418","display_name":"Jun Xu","orcid":"https://orcid.org/0000-0001-7101-4280"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Xu","raw_affiliation_strings":["Google, Inc., Mountain View, CA","Google Inc., Mountain View, CA#TAB#"],"affiliations":[{"raw_affiliation_string":"Google, Inc., Mountain View, CA","institution_ids":["https://openalex.org/I1291425158"]},{"raw_affiliation_string":"Google Inc., Mountain View, CA#TAB#","institution_ids":["https://openalex.org/I1291425158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023563381"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":3.7547,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.93558048,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"562","last_page":"572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.8355076313018799},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8082393407821655},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7685408592224121},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.7058848142623901},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7039218544960022},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.6699662804603577},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6015421152114868},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.5422608852386475},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5146263837814331},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.46369847655296326},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44709014892578125},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.4394409954547882},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3264855146408081},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2733958959579468},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25128602981567383},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.17129185795783997},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.12164729833602905}],"concepts":[{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.8355076313018799},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8082393407821655},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7685408592224121},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.7058848142623901},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7039218544960022},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.6699662804603577},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6015421152114868},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.5422608852386475},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5146263837814331},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.46369847655296326},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44709014892578125},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.4394409954547882},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3264855146408081},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2733958959579468},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25128602981567383},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.17129185795783997},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.12164729833602905},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1315245.1315314","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1315245.1315314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1112477","https://openalex.org/W73531603","https://openalex.org/W88694106","https://openalex.org/W206265171","https://openalex.org/W1502476232","https://openalex.org/W1597305440","https://openalex.org/W1947347140","https://openalex.org/W2020841721","https://openalex.org/W2033811087","https://openalex.org/W2034362794","https://openalex.org/W2055084740","https://openalex.org/W2098806455","https://openalex.org/W2100198871","https://openalex.org/W2100583963","https://openalex.org/W2102970979","https://openalex.org/W2103919170","https://openalex.org/W2108860402","https://openalex.org/W2119736157","https://openalex.org/W2120138937","https://openalex.org/W2140073981","https://openalex.org/W2140611647","https://openalex.org/W2145377152","https://openalex.org/W2146804254","https://openalex.org/W2151996777","https://openalex.org/W2154555738","https://openalex.org/W2163762767","https://openalex.org/W2165952552","https://openalex.org/W2183177643","https://openalex.org/W2743634147","https://openalex.org/W2914982603","https://openalex.org/W4234020632","https://openalex.org/W6600040955","https://openalex.org/W6602954136","https://openalex.org/W6635716266","https://openalex.org/W7066491068"],"related_works":["https://openalex.org/W2383958993","https://openalex.org/W3043810321","https://openalex.org/W2560421591","https://openalex.org/W2123075981","https://openalex.org/W2892115998","https://openalex.org/W2537414278","https://openalex.org/W2796094063","https://openalex.org/W2293245356","https://openalex.org/W1978034799","https://openalex.org/W2147468904"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1,24,71,97],"have":[2,33,177],"been":[3,34],"the":[4,9,35,81,99,119,123,127,131,138,145,150,155,159,163,198],"main":[5],"contributing":[6],"factor":[7],"to":[8,58,148,196],"Internet":[10],"security":[11,44,85],"problems":[12],"such":[13,25,106],"as":[14,26],"fast":[15],"spreading":[16],"worms.":[17],"Among":[18],"these":[19],"software":[20,70],"vulnerabilities,":[21,116],"memory":[22,95,114,134],"corruption":[23,96,115,120,135,151],"buffer":[27,178],"overflow":[28],"and":[29,153,182],"format":[30,183],"string":[31,184],"bugs":[32],"most":[36],"common":[37],"ones":[38],"exploited":[39],"by":[40],"network-based":[41],"attacks.":[42],"Many":[43],"countermeasures":[45],"(e.g.,":[46],"patching,":[47],"automatic":[48,199],"signature":[49],"generation":[50],"for":[51,112],"intrusion":[52],"detection":[53,100],"systems)":[54],"require":[55],"vulnerability":[56,200],"information":[57,111],"function":[59],"correctly.":[60],"However,":[61],"despite":[62],"many":[63],"years":[64],"of":[65,83,101,133,140,157,172],"research,":[66],"automatically":[67,92],"identifying":[68],"unknown":[69,94,113,164],"still":[72],"remains":[73],"an":[74],"open":[75],"problem.In":[76],"this":[77],"paper,":[78],"we":[79],"present":[80],"development":[82],"a":[84,170,193],"debugging":[86],"tool":[87,195],"named":[88],"MemSherlock,":[89],"which":[90],"can":[91],"identify":[93],"upon":[98],"malicious":[102,146,160],"payloads":[103],"that":[104,129,143,176,190],"exploit":[105],"vulnerabilities.":[107,185],"MemSherlock":[108,168,191],"provides":[109],"critical":[110],"including":[117],"(1)":[118],"point":[121],"in":[122],"source":[124,141],"code":[125,142],"(i.e.,":[126],"statement":[128],"allows":[130],"exploitation":[132],"vulnerability),":[136],"(2)":[137],"slice":[139],"helps":[144],"input":[147,161],"reach":[149],"point,":[152],"(3)":[154],"description":[156],"how":[158],"exploits":[162],"vulnerability.":[165],"We":[166],"evaluate":[167],"with":[169],"set":[171],"11":[173],"real-world":[174],"applications":[175],"overflow,":[179,181],"heap":[180],"The":[186],"evaluation":[187],"results":[188],"indicate":[189],"is":[192],"useful":[194],"facilitate":[197],"analysis":[201],"process.":[202]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
