Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning

Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constr...

Full description

Saved in:
Bibliographic Details
Published in:Mathematical problems in engineering Vol. 2017; no. 2017; pp. 1 - 13
Main Authors: Tang, Chaojing, Zhang, Bin, Feng, Chao, Meng, Qingkun
Format: Journal Article
Language:English
Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017
Hindawi
John Wiley & Sons, Inc
Subjects:
ISSN:1024-123X, 1563-5147
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average F1 score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder.
AbstractList Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average F 1 score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder.
Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average F1 score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder.
Author Tang, Chaojing
Zhang, Bin
Meng, Qingkun
Feng, Chao
Author_xml – sequence: 1
  fullname: Tang, Chaojing
– sequence: 2
  fullname: Zhang, Bin
– sequence: 3
  fullname: Feng, Chao
– sequence: 4
  fullname: Meng, Qingkun
BookMark eNqF0M9LwzAUB_AgE9ymN89S8Kh1eWnSH8c5_AUbu6h4K0n7qhk1nUm74X9vZgeCIJ7yDp_ve-E7IgPTGCTkFOgVgBATRiGZCC5YlMUHZAgijkIBPBn4mTIeAotejsjIuRWlDASkQ7KYOqddq81roE0w7Ur9PTdVcN1VFdpguUFb1c02eO5qg1YqXXuCLthoGSxk8aYNBnOU1vjcMTmsZO3wZP-OydPtzePsPpwv7x5m03lYRDFtQ54WoNIyU0KpDNI0Q2QqiQVAIRLKhaKy4LTkJSCmEefA_WeVVCVVKcYsjsbkvN-7ts1Hh67NV01njT-ZQ7ZLZIxmXrFeFbZxzmKVF7qVrW5Ma6Wuc6D5rrZ8V1u-r82HLn-F1la_S_v5F7_oue-hlFv9nz7rNXqDlfzRkNEE0ugLo_6Ffg
CitedBy_id crossref_primary_10_1145_3494521
crossref_primary_10_1371_journal_pone_0196733
crossref_primary_10_3390_electronics10020110
crossref_primary_10_1155_2022_7645210
Cites_doi 10.1109/WCRE.2001.957806
10.1145/800191.805647
10.1109/SERE.2012.30
10.1109/SCAM.2008.24
10.1109/ASE.2008.69
10.1145/2001420.2001459
10.1145/2420950.2421003
10.1109/EC2ND.2010.14
10.1109/SP.2014.44
10.1145/1572272.1572288
10.1016/S0034-4257(97)00083-7
10.1145/1950365.1950396
10.1145/1065010.1065036
10.21236/ADA484701
10.1145/940071.940115
10.4018/978-1-61350-053-8.ch002
10.1109/TASE.2016.15
10.1145/1882291.1882338
10.1109/SP.2015.54
10.1109/COMPSAC.2014.62
10.1145/1029894.1029911
10.1109/ISSREW.2014.26
10.1145/2408776.2408795
10.1145/2508859.2516736
10.1145/2508859.2516665
ContentType Journal Article
Copyright Copyright © 2017 Qingkun Meng et al.
Copyright © 2017 Qingkun Meng et al.; This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright_xml – notice: Copyright © 2017 Qingkun Meng et al.
– notice: Copyright © 2017 Qingkun Meng et al.; This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CWDGH
DWQXO
FR3
GNUQQ
HCIFZ
JQ2
K7-
KR7
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1155/2017/5452396
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
Middle East & Africa Database
ProQuest Central
Engineering Research Database
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest - Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
Middle East & Africa Database
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef


Publicly Available Content Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1563-5147
Editor Islam, Nazrul
Editor_xml – sequence: 1
  givenname: Nazrul
  surname: Islam
  fullname: Islam, Nazrul
EndPage 13
ExternalDocumentID 10_1155_2017_5452396
1190718
GroupedDBID -~9
0R~
188
24P
29M
2UF
2WC
4.4
5GY
5VS
8FE
8FG
8R4
8R5
AAFWJ
AAMMB
ABJCF
ABUWG
ACCMX
ACIPV
ACIWK
ADBBV
ADJCN
AEFGJ
AENEX
AFFNX
AFKRA
AGXDD
AHFXO
AIDQK
AIDYY
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BCNDV
BENPR
BGLVJ
BPHCQ
C1A
CAG
CCPQU
COF
CS3
CWDGH
E3Z
EBS
EJD
H13
HCIFZ
IL9
IPNFZ
K6V
K7-
KQ8
L6V
M7S
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
REM
RHU
RIG
RNS
TR2
UGNYK
XSB
YQT
3V.
AAJEY
ABDBF
AINHJ
ESX
GROUPED_DOAJ
I-F
IAO
IEA
IOF
ISR
ITC
MK~
M~E
RHW
RHX
TUS
~8M
AAYXX
AFFHD
ALUQN
CITATION
7TB
8FD
AZQEC
DWQXO
FR3
GNUQQ
JQ2
KR7
PKEHL
PQEST
PQUKI
PRINS
ID FETCH-LOGICAL-c360t-48c1b8d9b5bb91889ee2b76511c57045b0ac40d4d1ee834414151babd0b8e6263
IEDL.DBID RHX
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000419044200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1024-123X
IngestDate Fri Jul 25 10:06:06 EDT 2025
Sat Nov 29 03:30:15 EST 2025
Tue Nov 18 22:29:01 EST 2025
Sun Jun 02 18:53:44 EDT 2024
Thu Sep 25 15:25:06 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2017
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-48c1b8d9b5bb91889ee2b76511c57045b0ac40d4d1ee834414151babd0b8e6263
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0884-5457
OpenAccessLink https://dx.doi.org/10.1155/2017/5452396
PQID 1983449209
PQPubID 237775
PageCount 13
ParticipantIDs proquest_journals_1983449209
crossref_citationtrail_10_1155_2017_5452396
crossref_primary_10_1155_2017_5452396
hindawi_primary_10_1155_2017_5452396
emarefa_primary_1190718
PublicationCentury 2000
PublicationDate 2017-01-01
PublicationDateYYYYMMDD 2017-01-01
PublicationDate_xml – month: 01
  year: 2017
  text: 2017-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: New York
PublicationTitle Mathematical problems in engineering
PublicationYear 2017
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References e_1_2_9_30_2
e_1_2_9_10_2
e_1_2_9_33_2
e_1_2_9_34_2
e_1_2_9_12_2
e_1_2_9_31_2
e_1_2_9_11_2
e_1_2_9_32_2
e_1_2_9_14_2
e_1_2_9_37_2
e_1_2_9_13_2
e_1_2_9_38_2
e_1_2_9_16_2
e_1_2_9_35_2
e_1_2_9_15_2
e_1_2_9_36_2
e_1_2_9_18_2
e_1_2_9_17_2
e_1_2_9_19_2
e_1_2_9_21_2
e_1_2_9_20_2
e_1_2_9_23_2
e_1_2_9_22_2
e_1_2_9_7_2
e_1_2_9_6_2
e_1_2_9_5_2
e_1_2_9_4_2
e_1_2_9_3_2
e_1_2_9_2_2
e_1_2_9_1_2
e_1_2_9_9_2
e_1_2_9_8_2
e_1_2_9_25_2
e_1_2_9_24_2
e_1_2_9_27_2
e_1_2_9_26_2
e_1_2_9_29_2
e_1_2_9_28_2
References_xml – ident: e_1_2_9_5_2
  doi: 10.1109/WCRE.2001.957806
– ident: e_1_2_9_21_2
– ident: e_1_2_9_25_2
  doi: 10.1145/800191.805647
– ident: e_1_2_9_33_2
  doi: 10.1109/SERE.2012.30
– ident: e_1_2_9_18_2
  doi: 10.1109/SCAM.2008.24
– ident: e_1_2_9_28_2
  doi: 10.1109/ASE.2008.69
– ident: e_1_2_9_1_2
  doi: 10.1145/2001420.2001459
– ident: e_1_2_9_6_2
  doi: 10.1145/2420950.2421003
– ident: e_1_2_9_35_2
– ident: e_1_2_9_32_2
  doi: 10.1109/EC2ND.2010.14
– ident: e_1_2_9_8_2
– ident: e_1_2_9_4_2
  doi: 10.1109/SP.2014.44
– ident: e_1_2_9_29_2
– ident: e_1_2_9_30_2
  doi: 10.1145/1572272.1572288
– ident: e_1_2_9_12_2
  doi: 10.1016/S0034-4257(97)00083-7
– ident: e_1_2_9_15_2
– ident: e_1_2_9_31_2
  doi: 10.1145/1950365.1950396
– ident: e_1_2_9_26_2
  doi: 10.1145/1065010.1065036
– ident: e_1_2_9_27_2
  doi: 10.21236/ADA484701
– ident: e_1_2_9_17_2
  doi: 10.1145/940071.940115
– ident: e_1_2_9_11_2
– ident: e_1_2_9_14_2
– ident: e_1_2_9_3_2
– ident: e_1_2_9_22_2
– ident: e_1_2_9_10_2
  doi: 10.4018/978-1-61350-053-8.ch002
– ident: e_1_2_9_20_2
– ident: e_1_2_9_24_2
  doi: 10.1109/TASE.2016.15
– ident: e_1_2_9_34_2
  doi: 10.1145/1882291.1882338
– ident: e_1_2_9_37_2
  doi: 10.1109/SP.2015.54
– ident: e_1_2_9_7_2
– ident: e_1_2_9_38_2
  doi: 10.1109/COMPSAC.2014.62
– ident: e_1_2_9_9_2
  doi: 10.1145/1029894.1029911
– ident: e_1_2_9_13_2
  doi: 10.1109/ISSREW.2014.26
– ident: e_1_2_9_19_2
– ident: e_1_2_9_2_2
  doi: 10.1145/2408776.2408795
– ident: e_1_2_9_16_2
– ident: e_1_2_9_23_2
  doi: 10.1145/2508859.2516736
– ident: e_1_2_9_36_2
  doi: 10.1145/2508859.2516665
SSID ssj0021518
Score 2.1454382
Snippet Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method...
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Artificial intelligence
Automation
Buffers
Classifiers
Engineering
International conferences
Machine learning
Overflow
Programming languages
Recall
Servers
Software engineering
Source code
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFH64gh5c6latMod6ktCkWSZzEhWLB1uLqPQWMktqoaZqW_37vpdOqyDqwdtAhiHhm7d8kzffA6hGmRQkMkQ6ldwJONpcmmrpCBVFoc6QkaWFiOs1b7XiTke07YHb0JZVTn1i4aj1QNEZeQ3JsR8Eou6K0-cXh7pG0d9V20JjHhZJqQz3-eL5Zat9O6NcGM8ml-HqpM7nd6al72GIrN_jNeqw7ZNg_5egtGyeUhxgpFp-JF783vvmp4vg01j_72tvwJpNO9nZZJ9swpzJS7BuU1BmDXxYgtUv-oRb0ETwyAfkXdbL2Rld4KDxIGPnY-qrwm7QELL-4J09jPskX11U2iL3Zm-9lDWLOk3DrIRrdxvuG5d3F1eO7b_gKD9yR04QK0_GWshQSuHFsTCmLnmEKZoKOaaC0k1V4OpAe8bQV3qYDHgyldqVsSGVmx1YyAe52QOGPE1LHihkewEJ0khudKilSDOXS879MpxMAUiUFSenHhn9pCApYZgQXImFqwzHs9nPE1GOH-btWiw_p2EChOG4DFWL7R8LVKaoJta2h8knpPu_Pz6AFVpscmBTgYXR69gcwpJ6G_WGr0d2q34AzVTs1w
  priority: 102
  providerName: ProQuest
Title Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
URI https://search.emarefa.net/detail/BIM-1190718
https://dx.doi.org/10.1155/2017/5452396
https://www.proquest.com/docview/1983449209
Volume 2017
WOSCitedRecordID wos000419044200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: P5Z
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: K7-
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: M7S
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Middle East & Africa Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: CWDGH
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/middleeastafrica
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: BENPR
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: PIMPY
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Open Access
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: 24P
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ6ISuLF9wNFsgc8mSYttN3uUY0Go2CDj6CXptvdIgkWIyB_35myaJQYvTTbdLtJZ3f6zdfOfgNQ9VMpSGSIdCq55XL0uThW0hKJ73sqRUYW5yKu17zVCjodERqRpOH8L3xEO6TnDpJ2FxmT8AtQCDzK3Go3Op-8CkFruuOtRhJ89c4sv_3Hvd-Qp6hfYmwgHBWfifxOenMv4xxhLtZh1YSG7GQ6lxuwoLNNWDNhIjNOONyCJpqUPDPrsl7GTmhbBbUHKTsdU7UTdoPLM-0PJuxh3CdR6Tz_FRkxe-_FrJlnT2pmhFW723B_cX531rBMVQQrqfv2yHKDxJGBEtKTUjhBILSuSe5j4JR4HAM0aceJaytXOVpTEQ0HIdqRsVS2DDRpz-zAYjbI9B4wZE9KcjdBDuaSTIzkWnlKiji1ueS8XoLjmcWixEiGU-WKfpRTB8-LyL6RsW8Jjj57v06lMn7pt2uM_9UNwxIEyRJUzWT8MUB5NlOR8bhh5Ah6WFGzxf7_RjmAFTqdfk4pw-LobawPYTl5H_WGbxVYOj1vhe0KFK64VaGM0Fs8ht4TXgkvm-FjJV-DH7WCzDc
linkProvider Hindawi Publishing
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9tAEB7RUER7KC19hQLdA_SCLPxe74EDhUIQSdoDLbkZ78NgKXUoToj6p_obO-OsAalqe-LAbSWvV7L3m8dnz34DsBHnUpDIEOlUcifkaHNZpqUjVBxHOkdGltUirl3e7yeDgfgyB7-aszBUVtn4xNpR65Gib-TbSI6DMBS-K2wF5bH5OUV-Vu0c7eNmbvr-waeTvY5jWwg4KojdsRMmypOJFjKSUnhJIozxJY8xy1ARx2xGupkKXR1qzxha38N45slMalcmhoRacN0Plz8c6lJFf3Nty45HMJ_EGMhbML93un_YuaF4ePfs8J1PaoDBoCm1j6Jtn5SqqaN3QA0C7gTBBfM9wwFGxoUL4uHT4o-4UAe7g6WH9pqewzObVrPdmR28gDlTLsOSTbGZdWDVMjy9o7_4EnoITvJx5TkrSrZLB1RoPMrZxwn1jWGf0dDz4WjKvk2GJM9dVxIXpmLXRcZ6dR2qYVai9vwVfL2Xp34NrXJUmrfAkIdqyUOFbDYkwR3JjY60FFnucsl50IatZsNTZcXXqQfIMK1JWBSlBI_UwqMNmzezL2eiI3-Z98Zi53YaJniYbrRhw2LpPwusNihKre-q0lsIrfz78ntY7Jz0umn3qH_8Dp7QwrOPU6vQGl9NzBo8Vtfjorpat2bC4Oy-Ufgb6w1Itg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VQhE9UCiPLhTwoT2haPOw4_iAUKGsqNouewC06iXEsVMiLdnS7HbVv9Zfx0zitJUQcOqBm6VYjhJ_8_iS8TcAW3GhFYkMkU6l9LhEm8syoz2Vx7EwBTKyrBFxPZDDYTIeq9ESXHRnYaissvOJjaM205y-kfeRHEecq9BX_cKVRYx2B29PfnrUQYr-tHbtNFqI7NvzBdK3-s3eLu71dhgOPnx-_9FzHQa8PIr9mceTPNCJUVporYIkUdaGWsaYhORCYrKj_SznvuEmsJZuH2C4C3Smja8TSzouuO4tuC15nFA52UgcXZI9nNgewwtJFzAad0X3QvRD0qym3t4RtQq4Fg5X7I8MBxgjV74TI1-Uv0WIJuwN1v7nF_YA7rtkm-201vEQlmy1Dmsu8WbOrdXrsHpNlfERHCJkyfNVx6ys2A4dW6HxtGDv5tRNhn1C8y8m0wX7Op-QaHdTX1zamp2VGTtsqlMtc8K1x4_hy4084hNYrqaV3QCG7NRoyXPkuJxkeLS0RhitssKXWsqoB6-7zU9zJ8lOnUEmaUPNhEgJKqmDSg-2L2eftFIkf5j31OHoahqmfZiE9GDL4eofC2x2iEqdR6vTKzg9-_vlV3AXcZYe7A33n8M9Wrf9YrUJy7PTuX0Bd_KzWVmfvmzshcG3m8bbLx7UUFE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assisting+in+Auditing+of+Buffer+Overflow+Vulnerabilities+via+Machine+Learning&rft.jtitle=Mathematical+problems+in+engineering&rft.au=Meng%2C+Qingkun&rft.au=Feng%2C+Chao&rft.au=Zhang%2C+Bin&rft.au=Tang%2C+Chaojing&rft.date=2017-01-01&rft.issn=1024-123X&rft.eissn=1563-5147&rft.volume=2017&rft.issue=1&rft_id=info:doi/10.1155%2F2017%2F5452396&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2017_5452396
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1024-123X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1024-123X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1024-123X&client=summon