Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by many developers. Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in so...
Saved in:
| Published in: | IEEE access Vol. 9; pp. 142879 - 142892 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2169-3536, 2169-3536 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by many developers. Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in software systems developed in C/C++. Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs). To improve vulnerability detection, we need to better understand the characteristics of such vulnerabilities and their root causes. In this study, we analyze 159 vulnerable code units from three representative projects (i.e., Linux Kernel, Mozilla, and Xen). First, the vulnerable code is characterized using the Orthogonal Defect Classification (ODC), showing that most buffer overflow vulnerabilities are related to missing or incorrect checking (e.g., missing if construct around statement or incorrect logical expression used as branch condition). Then, we run two widely used C/C++ Static Analysis Tools (SATs) (i.e., CppCheck and Flawfinder) on the vulnerable and neutral (after the vulnerability fix) versions of each code unit, showing the low effectiveness of this type of tool in detecting buffer overflow vulnerabilities. Finally, we characterize the vulnerable and neutral versions of each code unit using software metrics, demonstrating that, although such metrics are frequently used as indicators of software quality, there is no clear correlation between them and the existence of buffer overflow in the code. As a result, we highlight a set of observations that should be considered to improve the detection of buffer overflow vulnerabilities. |
|---|---|
| AbstractList | Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by many developers. Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in software systems developed in C/C++. Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs). To improve vulnerability detection, we need to better understand the characteristics of such vulnerabilities and their root causes. In this study, we analyze 159 vulnerable code units from three representative projects (i.e., Linux Kernel, Mozilla, and Xen). First, the vulnerable code is characterized using the Orthogonal Defect Classification (ODC), showing that most buffer overflow vulnerabilities are related to missing or incorrect checking (e.g., missing if construct around statement or incorrect logical expression used as branch condition). Then, we run two widely used C/C++ Static Analysis Tools (SATs) (i.e., CppCheck and Flawfinder) on the vulnerable and neutral (after the vulnerability fix) versions of each code unit, showing the low effectiveness of this type of tool in detecting buffer overflow vulnerabilities. Finally, we characterize the vulnerable and neutral versions of each code unit using software metrics, demonstrating that, although such metrics are frequently used as indicators of software quality, there is no clear correlation between them and the existence of buffer overflow in the code. As a result, we highlight a set of observations that should be considered to improve the detection of buffer overflow vulnerabilities. |
| Author | Ivaki, Naghmeh Pereira, Jose D'Abruzzo Vieira, Marco |
| Author_xml | – sequence: 1 givenname: Jose D'Abruzzo orcidid: 0000-0003-0717-3396 surname: Pereira fullname: Pereira, Jose D'Abruzzo email: josep@dei.uc.pt organization: Centre for Informatics and Systems of the University of Coimbra, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal – sequence: 2 givenname: Naghmeh orcidid: 0000-0001-8376-6711 surname: Ivaki fullname: Ivaki, Naghmeh organization: Centre for Informatics and Systems of the University of Coimbra, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal – sequence: 3 givenname: Marco orcidid: 0000-0001-5103-8541 surname: Vieira fullname: Vieira, Marco organization: Centre for Informatics and Systems of the University of Coimbra, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal |
| BookMark | eNp9kU1LxDAQhoMouK7-Ai8Fj8uu-WiS5rgWv2BBwY9rSJPJmqU2a9pV9NdbrYp4MJcJwzzvDDx7aLuJDSB0SPCMEKyO52V5enMzo5iSGSMUs1xtoRElQk0ZZ2L7138XHbTtCvev6FtcjtBZ-WCSsR2k8BaaZXay8R5SdvUMydfxJbvf1A0kU4U6dAHaLDTZwqQlZOVxOZlk1ymuwHbtPtrxpm7h4KuO0d3Z6W15MV1cnV-W88XUMsrUlHisrMMcM6YIlnlVFDbnijIiaCGx9ExU2AnJC89BiEIQ70RujXDWeSMrNkaXQ66LZqXXKTya9KqjCfqzEdNSm9QFW4PGnHBnaWWl53leceWckr7fCRWTkkKfdTRkrVN82kDb6VXcpKY_X1NeCK6wwnk_pYYpm2LbJvDahs50ITZdMqHWBOsPC3qwoD8s6C8LPcv-sN8X_08dDlQAgB-ityWwyNk7Wa2Spw |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1016_j_cose_2022_102948 crossref_primary_10_3390_electronics14132703 crossref_primary_10_3390_electronics13234817 |
| Cites_doi | 10.1109/MINES.2012.202 10.1007/s11859-019-1380-z 10.1109/32.177364 10.1109/SP.2006.29 10.1109/ICSE.2013.6606613 10.1109/TSE.2006.38 10.2307/2529310 10.1109/MSP.2005.23 10.1109/ISSRE.2017.11 10.1007/s10664-011-9190-8 10.1109/DSN.2006.72 10.1109/ISSRE.2014.32 10.3390/s21072329 10.1109/ISSREW.2015.7392027 10.14722/ndss.2018.23158 10.1109/EDCC.2016.34 10.1145/1370788.1370793 10.1145/3377811.3380923 10.1177/001316446002000104 10.1007/s10664-017-9541-1 10.1109/MSP.2004.111 10.1109/TSE.2010.81 10.1109/ACCESS.2020.3041181 10.1016/j.infsof.2021.106614 10.1016/j.future.2019.09.009 10.1109/ICMLA.2018.00120 10.1109/LADC.2016.32 10.1109/TSE.1981.231113 10.1007/978-81-322-2268-2_59 10.1109/SYNASC.2017.00035 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
| DOI | 10.1109/ACCESS.2021.3120349 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 142892 |
| ExternalDocumentID | oai_doaj_org_article_0515dc2bc7f544b59dd97f74beb3772e 10_1109_ACCESS_2021_3120349 9576064 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Project “AIDA—Adaptive, Intelligent and Distributed Assurance Platform” co-financed by the European Regional Development Fund (ERDF) and COMPETE 2020 grantid: POCI-01-0247-FEDER-045907 funderid: 10.13039/501100001871 – fundername: FCT under Carnegie Mellon University (CMU) Portugal funderid: 10.13039/100008047 – fundername: Project METRICS through FCT grantid: POCI-01-0145-FEDER-032504 funderid: 10.13039/501100001871 – fundername: Portuguese Foundation for Science and Technology (FCT) grantid: 2020.04503.BD |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c3239-1f09cd0503391074b88c459231628707f36b0d6758f5e66861fd64ca6dcdfa7b3 |
| IEDL.DBID | RIE |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:43:28 EDT 2025 Mon Jun 30 06:13:20 EDT 2025 Sat Nov 29 06:31:39 EST 2025 Tue Nov 18 21:08:02 EST 2025 Wed Aug 27 02:28:58 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3239-1f09cd0503391074b88c459231628707f36b0d6758f5e66861fd64ca6dcdfa7b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-8376-6711 0000-0001-5103-8541 0000-0003-0717-3396 |
| OpenAccessLink | https://ieeexplore.ieee.org/document/9576064 |
| PQID | 2586590904 |
| PQPubID | 4845423 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2586590904 crossref_primary_10_1109_ACCESS_2021_3120349 doaj_primary_oai_doaj_org_article_0515dc2bc7f544b59dd97f74beb3772e ieee_primary_9576064 crossref_citationtrail_10_1109_ACCESS_2021_3120349 |
| PublicationCentury | 2000 |
| PublicationDate | 20210000 2021-00-00 20210101 2021-01-01 |
| PublicationDateYYYYMMDD | 2021-01-01 |
| PublicationDate_xml | – year: 2021 text: 20210000 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2021 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | (ref23) 2021 ref13 ref56 ref12 watson (ref31) 1996 ref14 campbell (ref27) 2013 ref55 ref11 ref54 ref10 ref17 ref16 ref51 gosain (ref30) 2015 ref50 shostack (ref37) 2014 ref46 ref45 (ref19) 2021 kratkiewicz (ref15) 2005 ref47 chess (ref8) 2007 ref43 (ref1) 2018 kresowaty (ref24) 2008 turpin (ref5) 2010 (ref18) 2006 ref9 ref35 (ref4) 2021 ref34 ref36 van der stock (ref53) 2017 jia (ref41) 2017 (ref28) 2021 al-boghdady (ref52) 2021; 21 ref33 ref32 (ref44) 2011 ref39 ref38 (ref40) 2005 marjamäki (ref48) 2019 jaffee (ref2) 2020 haller (ref42) 2013 boehm (ref7) 1981 freitez (ref29) 2009 ref25 ref20 ref22 ref21 wheeler (ref49) 2019 (ref26) 2021 (ref6) 2021 zurier (ref3) 2021 |
| References_xml | – ident: ref20 doi: 10.1109/MINES.2012.202 – ident: ref51 doi: 10.1007/s11859-019-1380-z – ident: ref45 doi: 10.1109/32.177364 – ident: ref25 doi: 10.1109/SP.2006.29 – ident: ref13 doi: 10.1109/ICSE.2013.6606613 – ident: ref38 doi: 10.1109/TSE.2006.38 – ident: ref47 doi: 10.2307/2529310 – year: 2020 ident: ref2 publication-title: COVID-19 Accounts For Most 2020 Cyberattacks – ident: ref21 doi: 10.1109/MSP.2005.23 – ident: ref12 doi: 10.1109/ISSRE.2017.11 – year: 1996 ident: ref31 article-title: Structured testing: A testing methodology using the cyclomatic complexity metric – start-page: 1 year: 2009 ident: ref29 article-title: Software vulnerabilities, prevention and detection methods: A review publication-title: SEC-MDA Security in Model Driven Architecture – ident: ref55 doi: 10.1007/s10664-011-9190-8 – ident: ref17 doi: 10.1109/DSN.2006.72 – ident: ref9 doi: 10.1109/ISSRE.2014.32 – year: 2019 ident: ref48 publication-title: Cppcheck-A Tool for Static C/C++ Code Analysis 2007 – year: 2006 ident: ref18 publication-title: CWE-119 Improper Restriction of Operations With in the Bounds of a Memory Buffer – year: 2021 ident: ref28 publication-title: Coverity static application security testing – volume: 21 start-page: 2329 year: 2021 ident: ref52 article-title: The presence, trends, and causes of security vulnerabilities in operating systems of IoT's low-end devices publication-title: SENSORS doi: 10.3390/s21072329 – year: 2021 ident: ref6 publication-title: The SEI CERT C++ Coding Standard – year: 2021 ident: ref26 publication-title: Parasoft CPPTest-C/C++ Static Code Analysis – year: 2021 ident: ref4 publication-title: What are the Most Secure Programming Languages? – ident: ref33 doi: 10.1109/ISSREW.2015.7392027 – ident: ref39 doi: 10.14722/ndss.2018.23158 – ident: ref35 doi: 10.1109/EDCC.2016.34 – year: 2021 ident: ref3 publication-title: Security Spending Will Top 40% in Most 2021 IT Budgets – ident: ref16 doi: 10.1145/1370788.1370793 – year: 2021 ident: ref23 publication-title: SpotBugs – start-page: 19 year: 2005 ident: ref15 article-title: Using a diagnostic corpus of C programs to evaluate buffer overflow detection by static analysis tools publication-title: Proc Workshop Eval Softw Defect Detection Tools – start-page: 989 year: 2017 ident: ref41 article-title: Towards efficient heap overflow discovery publication-title: Proc 26th USENIX Secur Symp (USENIX Secur ) – ident: ref43 doi: 10.1145/3377811.3380923 – ident: ref46 doi: 10.1177/001316446002000104 – ident: ref36 doi: 10.1007/s10664-017-9541-1 – year: 2021 ident: ref19 publication-title: Common Weakness Enumeration – ident: ref22 doi: 10.1109/MSP.2004.111 – ident: ref10 doi: 10.1109/TSE.2010.81 – ident: ref14 doi: 10.1109/ACCESS.2020.3041181 – year: 2014 ident: ref37 publication-title: Threat Modeling Designing for Security – start-page: 49 year: 2013 ident: ref42 article-title: Dowsing for overflows: A guided fuzzer to find buffer boundary violations publication-title: Proc 22nd USENIX Secur Symp (USENIX Secur ) – year: 1981 ident: ref7 publication-title: Software Engineering Economics – ident: ref34 doi: 10.1016/j.infsof.2021.106614 – year: 2011 ident: ref44 publication-title: SciTools Understand-Metrics – year: 2017 ident: ref53 publication-title: OWASP Top 10-2017-The Ten Most Critical Web Application Security Risks – ident: ref56 doi: 10.1016/j.future.2019.09.009 – year: 2018 ident: ref1 publication-title: Information Technology-Security Techniques-Information Security Management Systems-Overview and Vocabulary – ident: ref50 doi: 10.1109/ICMLA.2018.00120 – year: 2005 ident: ref40 publication-title: National Vulnerability Database – year: 2013 ident: ref27 publication-title: SonarQube in Action – ident: ref11 doi: 10.1109/LADC.2016.32 – year: 2010 ident: ref5 publication-title: OWASP Secure Coding Practices-Quick Reference Guide-OWASP – year: 2007 ident: ref8 publication-title: Secure Programming with Static Analysis – ident: ref54 doi: 10.1109/TSE.1981.231113 – year: 2019 ident: ref49 publication-title: Flawfinder 2001 – start-page: 581 year: 2015 ident: ref30 article-title: Static analysis: A survey of techniques and tools publication-title: Intelligent Computing and Applications doi: 10.1007/978-81-322-2268-2_59 – ident: ref32 doi: 10.1109/SYNASC.2017.00035 – year: 2008 ident: ref24 article-title: FxCop and code analysis: Writing your own custom rules |
| SSID | ssj0000816957 |
| Score | 2.2970326 |
| Snippet | Security vulnerabilities are present in most software systems, especially in projects with a large codebase, with several versions over the years, developed by... |
| SourceID | doaj proquest crossref ieee |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 142879 |
| SubjectTerms | buffer overflow Buffers C plus plus C++ (programming language) Codes Memory management orthogonal defect classification (ODC) Overflow Security Software Software metrics Software security Software systems Static analysis static code analysis Vulnerability vulnerability detection |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA5SPOhB1CquVsnBW126jzyP7WLxUGoPWnoLu8kGCmUrfSj4683sbpeKoBevIfvIzGQy32T4BqF75xYlMTz0KSfaJ9ptKWFZ6EsbcJ5aa7IymTMd8fFYzGZystfqC2rCKnrgSnA96EFidJRpbikhGZXGSG45yRwKdJFhDt7XRT17YKr0wSJkkvKaZigMZK-fJG5FDhBGocOpEdCyfDuKSsb-usXKD79cHjbDU3RSR4m4X_3dGTrIi3N0vMcd2EbDpKFa_nQDeLCFTif42ZmmXSw_8HS7AELpsvbVoWE8L_AIqr5x0ku6XTypMjDrC_Q6fHxJnvy6KYKv4yiWfmgDqQ2wuMQSiikzITShEKYxuLPkNmZZYAAGWJozJlhoDSM6ZUYbm_IsvkStYlnkVwjTXOaa8txSnhKTapHplAdWCsljYCvyULSTj9I1Yzg0rlioEjkEUlVCVSBUVQvVQw_NQ28VYcbv0wcg-GYqsF2XA84GVG0D6i8b8FAb1Na8xGne4TLioc5OjaremWsVUcGoDGRArv_j0zfoCJZTJWU6qLVZbfNbdKjfN_P16q40yi8AY-FO priority: 102 providerName: Directory of Open Access Journals |
| Title | Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects |
| URI | https://ieeexplore.ieee.org/document/9576064 https://www.proquest.com/docview/2586590904 https://doaj.org/article/0515dc2bc7f544b59dd97f74beb3772e |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JT-MwFH4CxAEOMGyiQ0E-cIPQLF7iY4mo5sAAB0DcrMSLhFS1qKUgceC3j59jokGDkOYSRYkd2fm8fc_P3wM49sOipEZkCRNUJ1T7LlU6niXSpULUzpkmGHPuL8XVVfnwIG-W4LQ7C2OtDc5n9gxvw16-meoFmsoG0i-O_RS6DMtCiPasVmdPwQAS_n0UFspSORhWla-Dp4B55plpjkIsnyafoNEfg6r8MxKH6WW0-X8F-wEbcRlJhi3uW7BkJ9uw_pe44A6Mqk6L-c0_IOcLDIVCrn3bdePpK7lfjFFxOjjHerpMHifkEt3CSTWoTk7ITWuime_C3ejitvqVxKgJiS7yQiaZS6U2KPNSSPS2bMpSU4brOI6bmsIVvEkN8gTHLOclz5zhVNfcaONq0RR7sDKZTuw-EGal1UxYx0RNTa3LRtcidbKUokA5ox7kH79T6SgpjpEtxipQi1SqFgOFGKiIQQ9Ou0xPraLG98nPEacuKcphhwceABV7l8JANUbnjRaOUdowaYwUztfdNoWnD7YHOwha95GIVw_6H6ir2HXnKmclZzKVKf35da4DWMMCtnaYPqw8zxb2EFb1y_PjfHYUSL2__n6_OAot9A9JhOAS |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bSxwxFD54A_WhVq10rdY8-KbjziWXyaMOLha3qw8qvoWZXEBYdovrttBfb04mDopS6NsQkiHJl-RccvIdgEN_LEpqRJYwQXVCtd9SpeNZIl0qRO2caYIz524oRqPy_l5eL8Bx9xbGWhuCz-wJfoa7fDPVc3SV9aVXjr0IXYRlRmmeta-1Oo8KppDwNSK1UJbK_mlV-VF4IzDPvG2aIxXLG_ETWPpjWpV3Z3EQMION_-vaZ_gUFUly2iK_CQt2sgXrr-gFt2FQdWzMf30BOZtjMhRy5VevG0__kLv5GDmnQ3isN5jJw4QMMTCcVP3q6Ihct06a2Re4HZzfVBdJzJuQ6CIvZJK5VGqDRC-FxHjLpiw1ZajJcbzWFK7gTWrQUnDMcl7yzBlOdc2NNq4WTbEDS5PpxH4Fwqy0mgnrmKipqXXZ6FqkTpZSFEho1IP8ZTqVjqTimNtirIJxkUrVYqAQAxUx6MFx1-hXy6nx7-pniFNXFQmxQ4EHQMX9pTBVjdF5o4Xza6Nh0hgpnB-7bQpvQNgebCNo3U8iXj3Ye0Fdxc07UzkrOZOpTOnux60OYPXi5udQDX-MLr_BGna29crswdLT49zuw4r-_fQwe_weVugziB7hMw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Characterizing+Buffer+Overflow+Vulnerabilities+in+Large+C%2FC%2B%2B+Projects&rft.jtitle=IEEE+access&rft.au=Pereira%2C+Jose+D%27Abruzzo&rft.au=Ivaki%2C+Naghmeh&rft.au=Vieira%2C+Marco&rft.date=2021&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=9&rft.spage=142879&rft.epage=142892&rft_id=info:doi/10.1109%2FACCESS.2021.3120349&rft.externalDocID=9576064 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |