{"id":"https://openalex.org/W2538458302","doi":"https://doi.org/10.1145/2976749.2978340","title":"CREDAL","display_name":"CREDAL","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2538458302","doi":"https://doi.org/10.1145/2976749.2978340","mag":"2538458302"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978340","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050722418","display_name":"Jun Xu","orcid":"https://orcid.org/0000-0001-7101-4280"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jun Xu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006504481","display_name":"Dongliang Mu","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongliang Mu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400329","display_name":"Ping Chen","orcid":"https://orcid.org/0000-0003-3789-7686"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ping Chen","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041094652","display_name":"Xinyu Xing","orcid":"https://orcid.org/0000-0001-6733-226X"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyu Xing","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462619","display_name":"Pei Wang","orcid":"https://orcid.org/0000-0001-9066-3948"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pei Wang","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050722418"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":6.208,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.96578674,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"529","last_page":"540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7974827289581299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.736579179763794},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7044254541397095},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.6168819665908813},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5512949228286743},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.5474780201911926},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5332372188568115},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.46748417615890503},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4494566023349762},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.420663058757782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36730220913887024},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.3450942933559418},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33843106031417847}],"concepts":[{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7974827289581299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.736579179763794},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7044254541397095},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.6168819665908813},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5512949228286743},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.5474780201911926},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5332372188568115},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.46748417615890503},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4494566023349762},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.420663058757782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36730220913887024},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.3450942933559418},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33843106031417847},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978340","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3890588820","display_name":null,"funder_award_id":"CNS-1422594 CNS-1505664","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4336922726","display_name":null,"funder_award_id":"W911NF-13-1-0421 W911NF-15-1-0576","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W101069649","https://openalex.org/W148396834","https://openalex.org/W1506510492","https://openalex.org/W1878544538","https://openalex.org/W2011541423","https://openalex.org/W2033472898","https://openalex.org/W2036196659","https://openalex.org/W2044590882","https://openalex.org/W2080019118","https://openalex.org/W2096598529","https://openalex.org/W2096905893","https://openalex.org/W2105204459","https://openalex.org/W2106017511","https://openalex.org/W2107316307","https://openalex.org/W2109178099","https://openalex.org/W2109359483","https://openalex.org/W2116409384","https://openalex.org/W2121081915","https://openalex.org/W2121204404","https://openalex.org/W2124360577","https://openalex.org/W2130343490","https://openalex.org/W2137723287","https://openalex.org/W2149222015","https://openalex.org/W2149234515","https://openalex.org/W2155851497","https://openalex.org/W2166007208","https://openalex.org/W2293302624","https://openalex.org/W2383417445","https://openalex.org/W2906444058","https://openalex.org/W4237907241","https://openalex.org/W4241947695","https://openalex.org/W4242838928","https://openalex.org/W4248066040"],"related_works":["https://openalex.org/W2331043530","https://openalex.org/W3122267592","https://openalex.org/W2042616262","https://openalex.org/W17195039","https://openalex.org/W2561476661","https://openalex.org/W4233969565","https://openalex.org/W1994367926","https://openalex.org/W1593750350","https://openalex.org/W2038480328","https://openalex.org/W2358672304"],"abstract_inverted_index":{"After":[0],"a":[1,12,22,26,30,63,79,84,89,106,113,121,147,157,174,188,236],"program":[2,149,220],"has":[3,36],"crashed":[4],"and":[5,109,155,179,184,200,244],"terminated":[6],"abnormally,":[7],"it":[8,43,194],"typically":[9],"leaves":[10],"behind":[11],"snapshot":[13],"of":[14,21,33,66,92,146,217],"its":[15],"crashing":[16,148,219],"state":[17],"in":[18,50,99,164,233],"the":[19,76,97,143,181,197,208,214,218,223,246],"form":[20],"core":[23,27,85,122,152,158,175,189],"dump.":[24],"While":[25],"dump":[28,86,123,153,159,176,190],"carries":[29],"large":[31],"amount":[32,91],"information,":[34],"which":[35,95],"long":[37],"been":[38],"used":[39],"for":[40,128],"software":[41,52,67,129,228],"debugging,":[42],"barely":[44],"serves":[45],"as":[46],"informative":[47,162],"debugging":[48,102],"aids":[49],"locating":[51],"faults,":[53],"particularly":[54],"memory":[55,59,167,237],"corruption":[56,60,168,238],"vulnerabilities.":[57,169],"A":[58],"vulnerability":[61],"is":[62],"special":[64],"type":[65],"faults":[68],"that":[69,141],"an":[70,138,161],"attacker":[71],"can":[72,124],"exploit":[73],"to":[74,116,150,160,250],"manipulate":[75],"content":[77],"at":[78],"certain":[80,90],"memory.":[81],"As":[82],"such,":[83],"may":[87],"contain":[88],"corrupted":[93,178,192,211],"data,":[94,193],"increases":[96],"difficulty":[98],"identifying":[100],"useful":[101],"information":[103],"(e.g.":[104],",":[105],"crash":[107,182,198],"point":[108,183,199],"stack":[110,185,201,224],"traces).":[111],"Without":[112],"proper":[114],"mechanism":[115],"deal":[117],"with":[118,222],"this":[119,133],"problem,":[120],"be":[125],"practically":[126],"useless":[127],"failure":[130],"diagnosis.":[131],"In":[132,203],"work,":[134],"we":[135],"develop":[136],"CREDAL,":[137],"automatic":[139],"tool":[140],"employs":[142],"source":[144,215],"code":[145,216,247],"enhance":[151],"analysis":[154,243],"turns":[156],"aid":[163],"tracking":[165,234],"down":[166,235],"Specifically,":[170],"CREDAL":[171,205,240],"systematically":[172],"analyzes":[173],"potentially":[177],"identifies":[180],"frames.":[186,225],"For":[187],"carrying":[191],"goes":[195],"beyond":[196],"trace.":[202],"particular,":[204],"further":[206],"pinpoints":[207],"variables":[209],"holding":[210],"data":[212,251],"using":[213],"along":[221],"To":[226],"assist":[227],"developers":[229],"(or":[230],"security":[231],"analysts)":[232],"vulnerability,":[239],"also":[241],"performs":[242],"highlights":[245],"fragments":[248],"corresponding":[249],"corruption.":[252]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2016-10-28T00:00:00"}
