{"id":"https://openalex.org/W4413184362","doi":"https://doi.org/10.1186/s42400-024-00322-9","title":"Pbaeg: combine-vulnerabilities AEG to defeat protection mechanisms","display_name":"Pbaeg: combine-vulnerabilities AEG to defeat protection mechanisms","publication_year":2025,"publication_date":"2025-08-13","ids":{"openalex":"https://openalex.org/W4413184362","doi":"https://doi.org/10.1186/s42400-024-00322-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00322-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00322-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00322-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00322-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102729629","display_name":"Yu Wang","orcid":"https://orcid.org/0009-0004-3482-817X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Wang","raw_affiliation_strings":["State Key Lab of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036786337","display_name":"Zhoujun Li","orcid":"https://orcid.org/0000-0002-9603-9713"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhoujun Li","raw_affiliation_strings":["State Key Lab of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044132351","display_name":"Yipeng Zhang","orcid":"https://orcid.org/0000-0002-3372-0173"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Zhang","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102729629"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":2.2456,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90217547,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.593719482421875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4839192032814026}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.593719482421875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4839192032814026}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00322-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00322-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00322-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f2c59eb69cc146bfb0856438bf2a29bd","is_oa":true,"landing_page_url":"https://doaj.org/article/f2c59eb69cc146bfb0856438bf2a29bd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-33 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00322-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00322-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-024-00322-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2323930268","display_name":null,"funder_award_id":"U1636211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3714348066","display_name":null,"funder_award_id":"62276017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5029846496","display_name":null,"funder_award_id":"U163621","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7104496898","display_name":null,"funder_award_id":"61672081","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7178492432","display_name":null,"funder_award_id":"CCF-NSFOCUS","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320316083","display_name":"Tencent","ror":"https://ror.org/00hhjss72"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413184362.pdf","grobid_xml":"https://content.openalex.org/works/W4413184362.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W203252516","https://openalex.org/W1480909796","https://openalex.org/W1497028280","https://openalex.org/W1992114977","https://openalex.org/W2057698738","https://openalex.org/W2069268700","https://openalex.org/W2113864883","https://openalex.org/W2368550879","https://openalex.org/W2401312886","https://openalex.org/W2512784977","https://openalex.org/W2642053679","https://openalex.org/W2765363641","https://openalex.org/W2766898821","https://openalex.org/W2781491433","https://openalex.org/W2794631344","https://openalex.org/W2887198767","https://openalex.org/W2962931396","https://openalex.org/W2963723316","https://openalex.org/W3014075473","https://openalex.org/W3098605233","https://openalex.org/W3101228802","https://openalex.org/W3193265466","https://openalex.org/W3194771370","https://openalex.org/W3207760230","https://openalex.org/W4206712151","https://openalex.org/W4211247591","https://openalex.org/W4221146651","https://openalex.org/W4283264706","https://openalex.org/W4283724882","https://openalex.org/W4297099551","https://openalex.org/W4302784197","https://openalex.org/W4307454765","https://openalex.org/W4310025025","https://openalex.org/W4311423650","https://openalex.org/W4312814274","https://openalex.org/W4322751585","https://openalex.org/W4385080372"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"Automatic":[1,89],"exploit":[2,84,132],"generation":[3,85,133,203],"(AEG)":[4],"refers":[5],"to":[6,78,113,124,168,176,181,187],"the":[7,12,15,25,41,62,67,109,126,154,178,183,189,198,222,241,251,255],"process":[8,26],"of":[9,27,65,98,185,204,229,243],"automatically":[10,94],"finding":[11,28],"path":[13],"in":[14,58,240,254],"program":[16],"that":[17,194],"can":[18,196,237],"trigger":[19],"vulnerabilities":[20,29,101,112],"and":[21,32,102,120,139,145,201,212,225,248],"generate":[22,114,169,238],"exploits.":[23,115,170],"Typically,":[24],"requires":[30],"fuzzing":[31],"symbolic":[33,118],"execution":[34,119],"techniques.":[35],"The":[36],"existing":[37,223],"AEG":[38,224],"usually":[39],"sets":[40],"preset":[42],"environment":[43,53,180],"ideally,":[44],"which":[45,93,216],"does":[46],"not":[47,55],"enable":[48],"all":[49,73],"protection":[50,74,137,151],"mechanisms.":[51,75,152],"This":[52],"is":[54],"universally":[56],"applicable":[57],"actual":[59],"attacks.":[60],"In":[61,76],"newest":[63],"version":[64],"GCC,":[66],"default":[68],"compilation":[69],"configuration":[70],"has":[71],"enabled":[72],"response":[77],"this":[79],"situation,":[80],"we":[81,172],"propose":[82],"an":[83],"system":[86],"Protection":[87],"Bypass":[88],"Exploit":[90],"Generator":[91],"(PBAEG)":[92],"detects":[95],"some":[96,158],"types":[97,228],"stack":[99,162],"overflow":[100,163],"format":[103],"string":[104],"vulnerabilities.":[105,230],"Then":[106],"PBAEG":[107,116,186,195,231],"combines":[108],"above":[110,127],"two":[111,128],"uses":[117],"dynamic":[121],"binary":[122,206,210],"analysis":[123],"find":[125],"vulnerabilities,":[129],"adopts":[130,232],"different":[131,136],"strategies":[134],"for":[135,157],"mechanisms,":[138],"defeats":[140],"Non-Executable,":[141],"Position-Independent":[142],"Executable,":[143],"Canary,":[144],"Address":[146],"Space":[147],"Layout":[148],"Randomization":[149],"(ASLR)":[150],"At":[153],"same":[155],"time,":[156],"difficult-to-exploit":[159],"situations,":[160],"advanced":[161],"exploitation":[164,202,235],"methods":[165],"are":[166],"applied":[167],"Finally,":[171],"also":[173],"use":[174],"docker":[175],"simulate":[177],"remote":[179,190,256],"test":[182],"ability":[184],"attack":[188],"environment.":[191,258],"Experiments":[192],"show":[193],"complete":[197],"vulnerability":[199,234],"detection":[200],"124":[205],"files,":[207,211],"22":[208],"capture-the-flag":[209],"10":[213],"public":[214],"software,":[215],"takes":[217],"a":[218],"shorter":[219],"time":[220],"than":[221],"covers":[226],"more":[227,233],"techniques,":[236],"exploits":[239],"form":[242],"files":[244],"by":[245],"using":[246],"pwntools,":[247],"successfully":[249],"verifies":[250],"exploitations":[252],"generated":[253],"simulation":[257]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
