{"id":"https://openalex.org/W4387360145","doi":"https://doi.org/10.1145/3609437.3609461","title":"FAEG: Feature-Driven Automatic Exploit Generation","display_name":"FAEG: Feature-Driven Automatic Exploit Generation","publication_year":2023,"publication_date":"2023-08-04","ids":{"openalex":"https://openalex.org/W4387360145","doi":"https://doi.org/10.1145/3609437.3609461"},"language":"en","primary_location":{"id":"doi:10.1145/3609437.3609461","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3609437.3609461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093006967","display_name":"Peng Xu","orcid":"https://orcid.org/0009-0006-0185-4974"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Xu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101846770","display_name":"Liangze Yin","orcid":"https://orcid.org/0000-0002-1645-2787"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangze Yin","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032350291","display_name":"Jiantong Ma","orcid":"https://orcid.org/0009-0002-3776-0399"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiantong Ma","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101607638","display_name":"Diansheng Yang","orcid":"https://orcid.org/0009-0004-2669-217X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Yang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100654380","display_name":"Wei Dong","orcid":"https://orcid.org/0000-0002-8033-7943"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Dong","raw_affiliation_strings":["College of Computer, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5093006967"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13011189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":null,"first_page":"165","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9748634099960327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8230772018432617},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.810006856918335},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.7753500938415527},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7634432911872864},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5419877171516418},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5285108685493469},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.49428439140319824},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4512096047401428},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.42326849699020386},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4212490916252136},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.13956427574157715},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13722312450408936},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.07361418008804321}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9748634099960327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8230772018432617},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.810006856918335},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.7753500938415527},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7634432911872864},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5419877171516418},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5285108685493469},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.49428439140319824},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4512096047401428},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.42326849699020386},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4212490916252136},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.13956427574157715},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13722312450408936},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.07361418008804321},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3609437.3609461","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3609437.3609461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W203252516","https://openalex.org/W1480909796","https://openalex.org/W1969501726","https://openalex.org/W2004843654","https://openalex.org/W2011367000","https://openalex.org/W2042033151","https://openalex.org/W2051990174","https://openalex.org/W2057698738","https://openalex.org/W2089448621","https://openalex.org/W2091939272","https://openalex.org/W2098010707","https://openalex.org/W2113864883","https://openalex.org/W2119251836","https://openalex.org/W2151829269","https://openalex.org/W2162800072","https://openalex.org/W2514974017","https://openalex.org/W2515236103","https://openalex.org/W2535617737","https://openalex.org/W2741068848","https://openalex.org/W2766540688","https://openalex.org/W2795192879","https://openalex.org/W2887198767","https://openalex.org/W2891235722","https://openalex.org/W2897668282","https://openalex.org/W2964241064","https://openalex.org/W2979357014","https://openalex.org/W2984993098","https://openalex.org/W3007157104","https://openalex.org/W3116383658","https://openalex.org/W4234542549","https://openalex.org/W4237492309","https://openalex.org/W6682481146"],"related_works":["https://openalex.org/W2479612266","https://openalex.org/W2180474751","https://openalex.org/W2353926745","https://openalex.org/W2390459954","https://openalex.org/W2895125301","https://openalex.org/W4214644882","https://openalex.org/W2393340519","https://openalex.org/W2181627506","https://openalex.org/W4390606847","https://openalex.org/W2589805430"],"abstract_inverted_index":{"Buffer":[0],"overflow":[1,82,102],"vulnerabilities":[2,56,70],"are":[3,14],"prevalent":[4],"in":[5,32,57,61,71],"software":[6,98],"applications,":[7],"and":[8,12,52,108,119,124],"their":[9],"automatic":[10,37,84],"detection":[11],"exploitation":[13,27,54,113],"of":[15,28,55,69],"great":[16],"significance.":[17],"Modern":[18],"operating":[19],"systems":[20],"implement":[21],"security":[22,49],"mitigation":[23,50],"to":[24,64,95],"prevent":[25],"the":[26,53,67],"these":[29],"vulnerabilities,":[30,103],"which":[31,90],"turn":[33],"become":[34],"obstacles":[35],"for":[36,99],"exploit":[38,85,127],"generation":[39,86],"(AEG).":[40],"Many":[41],"current":[42],"AEG":[43],"solutions":[44],"do":[45],"not":[46],"fully":[47],"consider":[48],"bypassing":[51,121],"special":[58],"cases,":[59],"resulting":[60],"an":[62],"inability":[63],"accurately":[65],"assess":[66],"exploitability":[68],"such":[72],"scenarios.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"propose":[78],"a":[79],"feature-driven":[80],"buffer":[81,101],"vulnerability":[83,106,117],"method":[87],"-":[88],"FAEG,":[89],"uses":[91],"optimized":[92],"symbolic":[93],"execution":[94],"search":[96],"target":[97],"potential":[100],"constructs":[104],"complete":[105],"models,":[107],"then":[109],"adaptively":[110],"selects":[111],"appropriate":[112],"techniques":[114],"based":[115],"on":[116],"type":[118],"features,":[120],"system":[122],"protection":[123],"generating":[125],"effective":[126],"program.":[128]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
