{"id":"https://openalex.org/W3015818873","doi":"https://doi.org/10.23919/icact48636.2020.9061281","title":"Analysis of software weakness detection of CBMC based on CWE","display_name":"Analysis of software weakness detection of CBMC based on CWE","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3015818873","doi":"https://doi.org/10.23919/icact48636.2020.9061281","mag":"3015818873"},"language":"en","primary_location":{"id":"doi:10.23919/icact48636.2020.9061281","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact48636.2020.9061281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015945529","display_name":"Minjae Byun","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Minjae Byun","raw_affiliation_strings":["Department of Information Security, Korea university, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Korea university, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100656213","display_name":"Yongjun Lee","orcid":"https://orcid.org/0000-0002-4780-5821"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yongjun Lee","raw_affiliation_strings":["Department of Information Security, Korea university, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Korea university, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030380431","display_name":"Jin\u2010Young Choi","orcid":"https://orcid.org/0000-0002-8100-7583"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jin-Young Choi","raw_affiliation_strings":["Department of Information Security, Korea university, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Korea university, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015945529"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":0.5775,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.72467576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"171","last_page":"175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7775648832321167},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7222179174423218},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.528231143951416},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5233322978019714},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5149694085121155},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.511039137840271},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.509774386882782},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.46779948472976685},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.43987447023391724},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.41466665267944336},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35828375816345215},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.32503998279571533},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.097674161195755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7775648832321167},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7222179174423218},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.528231143951416},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5233322978019714},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5149694085121155},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.511039137840271},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.509774386882782},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.46779948472976685},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.43987447023391724},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.41466665267944336},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35828375816345215},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.32503998279571533},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.097674161195755},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/icact48636.2020.9061281","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact48636.2020.9061281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},{"id":"mag:3041484575","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002256071875839","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W327452528","https://openalex.org/W1577404745","https://openalex.org/W2001289891","https://openalex.org/W2022759867","https://openalex.org/W2090657160","https://openalex.org/W2104588447","https://openalex.org/W2115309705","https://openalex.org/W2129538349","https://openalex.org/W2134716394","https://openalex.org/W2156299003","https://openalex.org/W2161253570","https://openalex.org/W2180475648","https://openalex.org/W2188548353","https://openalex.org/W2532644805","https://openalex.org/W2964061050"],"related_works":["https://openalex.org/W1485837041","https://openalex.org/W3204955359","https://openalex.org/W1598160211","https://openalex.org/W2037121848","https://openalex.org/W4253521920","https://openalex.org/W2179621094","https://openalex.org/W2067499928","https://openalex.org/W1524028411","https://openalex.org/W2138059712","https://openalex.org/W2018145554"],"abstract_inverted_index":{"Model":[0,20],"checking":[1,21],"is":[2,72],"a":[3,8,12,28],"method":[4],"of":[5,31,69,100],"verifying":[6],"whether":[7],"target":[9],"system":[10],"satisfies":[11],"specific":[13],"property":[14],"using":[15,107],"mathematical":[16],"and":[17,34,43,55],"logical":[18],"proofs.":[19],"tools":[22,51,81],"to":[23,74,111],"verify":[24,94,116],"design":[25,33],"(1)":[26],"require":[27],"formal":[29],"description":[30],"the":[32,41,89,117],"(2)":[35],"there":[36],"can":[37,58,82,93,114],"be":[38],"discrepancies":[39],"between":[40],"model":[42],"actual":[44],"implementation.":[45],"To":[46],"solve":[47],"these":[48,80,120],"problems,":[49],"various":[50],"such":[52],"as":[53],"CBMC":[54,92,113],"BLAST":[56],"that":[57,91],"directly":[59],"input":[60],"C":[61],"codes":[62,118],"have":[63],"been":[64],"proposed.":[65],"However,":[66],"in":[67],"terms":[68],"security,":[70],"it":[71],"difficult":[73],"figure":[75],"out":[76],"which":[77],"software":[78],"weaknesses":[79],"verify.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87],"matched":[88],"properties":[90],"with":[95],"corresponding":[96],"CWEs,":[97],"considering":[98],"interdependencies":[99],"CWEs.":[101,121],"We":[102],"also":[103],"conducted":[104],"an":[105],"experiment":[106],"Juliet":[108],"Test":[109],"Suite":[110],"check":[112],"actually":[115],"including":[119]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
