Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constr...
Saved in:
| Published in: | Mathematical problems in engineering Vol. 2017; no. 2017; pp. 1 - 13 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Cairo, Egypt
Hindawi Publishing Corporation
01.01.2017
Hindawi John Wiley & Sons, Inc |
| Subjects: | |
| ISSN: | 1024-123X, 1563-5147 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average F1 score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder. |
|---|---|
| AbstractList | Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average
F
1
score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder. Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities. First, an extended code property graph is constructed from the source code to extract seven kinds of static attributes, which are used to describe buffer properties. After embedding these attributes into a vector space, five frequently used machine learning algorithms are employed to classify the functions into suspicious vulnerable functions and secure ones. The five classifiers reached an average recall of 83.5%, average true negative rate of 85.9%, a best recall of 96.6%, and a best true negative rate of 91.4%. Due to the imbalance of the training samples, the average precision of the classifiers is 68.9% and the average F1 score is 75.2%. When the classifiers were applied to a new program, our method could reduce the false positive to 1/12 compared to Flawfinder. |
| Author | Tang, Chaojing Zhang, Bin Meng, Qingkun Feng, Chao |
| Author_xml | – sequence: 1 fullname: Tang, Chaojing – sequence: 2 fullname: Zhang, Bin – sequence: 3 fullname: Feng, Chao – sequence: 4 fullname: Meng, Qingkun |
| BookMark | eNqF0M9LwzAUB_AgE9ymN89S8Kh1eWnSH8c5_AUbu6h4K0n7qhk1nUm74X9vZgeCIJ7yDp_ve-E7IgPTGCTkFOgVgBATRiGZCC5YlMUHZAgijkIBPBn4mTIeAotejsjIuRWlDASkQ7KYOqddq81roE0w7Ur9PTdVcN1VFdpguUFb1c02eO5qg1YqXXuCLthoGSxk8aYNBnOU1vjcMTmsZO3wZP-OydPtzePsPpwv7x5m03lYRDFtQ54WoNIyU0KpDNI0Q2QqiQVAIRLKhaKy4LTkJSCmEefA_WeVVCVVKcYsjsbkvN-7ts1Hh67NV01njT-ZQ7ZLZIxmXrFeFbZxzmKVF7qVrW5Ma6Wuc6D5rrZ8V1u-r82HLn-F1la_S_v5F7_oue-hlFv9nz7rNXqDlfzRkNEE0ugLo_6Ffg |
| CitedBy_id | crossref_primary_10_1145_3494521 crossref_primary_10_1371_journal_pone_0196733 crossref_primary_10_3390_electronics10020110 crossref_primary_10_1155_2022_7645210 |
| Cites_doi | 10.1109/WCRE.2001.957806 10.1145/800191.805647 10.1109/SERE.2012.30 10.1109/SCAM.2008.24 10.1109/ASE.2008.69 10.1145/2001420.2001459 10.1145/2420950.2421003 10.1109/EC2ND.2010.14 10.1109/SP.2014.44 10.1145/1572272.1572288 10.1016/S0034-4257(97)00083-7 10.1145/1950365.1950396 10.1145/1065010.1065036 10.21236/ADA484701 10.1145/940071.940115 10.4018/978-1-61350-053-8.ch002 10.1109/TASE.2016.15 10.1145/1882291.1882338 10.1109/SP.2015.54 10.1109/COMPSAC.2014.62 10.1145/1029894.1029911 10.1109/ISSREW.2014.26 10.1145/2408776.2408795 10.1145/2508859.2516736 10.1145/2508859.2516665 |
| ContentType | Journal Article |
| Copyright | Copyright © 2017 Qingkun Meng et al. Copyright © 2017 Qingkun Meng et al.; This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
| Copyright_xml | – notice: Copyright © 2017 Qingkun Meng et al. – notice: Copyright © 2017 Qingkun Meng et al.; This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
| DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU CWDGH DWQXO FR3 GNUQQ HCIFZ JQ2 K7- KR7 L6V M7S P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.1155/2017/5452396 |
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College Middle East & Africa Database ProQuest Central Engineering Research Database ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest - Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection Middle East & Africa Database ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering |
| EISSN | 1563-5147 |
| Editor | Islam, Nazrul |
| Editor_xml | – sequence: 1 givenname: Nazrul surname: Islam fullname: Islam, Nazrul |
| EndPage | 13 |
| ExternalDocumentID | 10_1155_2017_5452396 1190718 |
| GroupedDBID | -~9 0R~ 188 24P 29M 2UF 2WC 4.4 5GY 5VS 8FE 8FG 8R4 8R5 AAFWJ AAMMB ABJCF ABUWG ACCMX ACIPV ACIWK ADBBV ADJCN AEFGJ AENEX AFFNX AFKRA AGXDD AHFXO AIDQK AIDYY ALMA_UNASSIGNED_HOLDINGS ARAPS BCNDV BENPR BGLVJ BPHCQ C1A CAG CCPQU COF CS3 CWDGH E3Z EBS EJD H13 HCIFZ IL9 IPNFZ K6V K7- KQ8 L6V M7S OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC PTHSS PUEGO Q2X REM RHU RIG RNS TR2 UGNYK XSB YQT 3V. AAJEY ABDBF AINHJ ESX GROUPED_DOAJ I-F IAO IEA IOF ISR ITC MK~ M~E RHW RHX TUS ~8M AAYXX AFFHD ALUQN CITATION 7TB 8FD AZQEC DWQXO FR3 GNUQQ JQ2 KR7 PKEHL PQEST PQUKI PRINS |
| ID | FETCH-LOGICAL-c360t-48c1b8d9b5bb91889ee2b76511c57045b0ac40d4d1ee834414151babd0b8e6263 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000419044200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1024-123X |
| IngestDate | Fri Jul 25 10:06:06 EDT 2025 Sat Nov 29 03:30:15 EST 2025 Tue Nov 18 22:29:01 EST 2025 Sun Jun 02 18:53:44 EDT 2024 Thu Sep 25 15:25:06 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2017 |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c360t-48c1b8d9b5bb91889ee2b76511c57045b0ac40d4d1ee834414151babd0b8e6263 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-0884-5457 |
| OpenAccessLink | https://dx.doi.org/10.1155/2017/5452396 |
| PQID | 1983449209 |
| PQPubID | 237775 |
| PageCount | 13 |
| ParticipantIDs | proquest_journals_1983449209 crossref_citationtrail_10_1155_2017_5452396 crossref_primary_10_1155_2017_5452396 hindawi_primary_10_1155_2017_5452396 emarefa_primary_1190718 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-01-01 |
| PublicationDateYYYYMMDD | 2017-01-01 |
| PublicationDate_xml | – month: 01 year: 2017 text: 2017-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Cairo, Egypt |
| PublicationPlace_xml | – name: Cairo, Egypt – name: New York |
| PublicationTitle | Mathematical problems in engineering |
| PublicationYear | 2017 |
| Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc |
| References | e_1_2_9_30_2 e_1_2_9_10_2 e_1_2_9_33_2 e_1_2_9_34_2 e_1_2_9_12_2 e_1_2_9_31_2 e_1_2_9_11_2 e_1_2_9_32_2 e_1_2_9_14_2 e_1_2_9_37_2 e_1_2_9_13_2 e_1_2_9_38_2 e_1_2_9_16_2 e_1_2_9_35_2 e_1_2_9_15_2 e_1_2_9_36_2 e_1_2_9_18_2 e_1_2_9_17_2 e_1_2_9_19_2 e_1_2_9_21_2 e_1_2_9_20_2 e_1_2_9_23_2 e_1_2_9_22_2 e_1_2_9_7_2 e_1_2_9_6_2 e_1_2_9_5_2 e_1_2_9_4_2 e_1_2_9_3_2 e_1_2_9_2_2 e_1_2_9_1_2 e_1_2_9_9_2 e_1_2_9_8_2 e_1_2_9_25_2 e_1_2_9_24_2 e_1_2_9_27_2 e_1_2_9_26_2 e_1_2_9_29_2 e_1_2_9_28_2 |
| References_xml | – ident: e_1_2_9_5_2 doi: 10.1109/WCRE.2001.957806 – ident: e_1_2_9_21_2 – ident: e_1_2_9_25_2 doi: 10.1145/800191.805647 – ident: e_1_2_9_33_2 doi: 10.1109/SERE.2012.30 – ident: e_1_2_9_18_2 doi: 10.1109/SCAM.2008.24 – ident: e_1_2_9_28_2 doi: 10.1109/ASE.2008.69 – ident: e_1_2_9_1_2 doi: 10.1145/2001420.2001459 – ident: e_1_2_9_6_2 doi: 10.1145/2420950.2421003 – ident: e_1_2_9_35_2 – ident: e_1_2_9_32_2 doi: 10.1109/EC2ND.2010.14 – ident: e_1_2_9_8_2 – ident: e_1_2_9_4_2 doi: 10.1109/SP.2014.44 – ident: e_1_2_9_29_2 – ident: e_1_2_9_30_2 doi: 10.1145/1572272.1572288 – ident: e_1_2_9_12_2 doi: 10.1016/S0034-4257(97)00083-7 – ident: e_1_2_9_15_2 – ident: e_1_2_9_31_2 doi: 10.1145/1950365.1950396 – ident: e_1_2_9_26_2 doi: 10.1145/1065010.1065036 – ident: e_1_2_9_27_2 doi: 10.21236/ADA484701 – ident: e_1_2_9_17_2 doi: 10.1145/940071.940115 – ident: e_1_2_9_11_2 – ident: e_1_2_9_14_2 – ident: e_1_2_9_3_2 – ident: e_1_2_9_22_2 – ident: e_1_2_9_10_2 doi: 10.4018/978-1-61350-053-8.ch002 – ident: e_1_2_9_20_2 – ident: e_1_2_9_24_2 doi: 10.1109/TASE.2016.15 – ident: e_1_2_9_34_2 doi: 10.1145/1882291.1882338 – ident: e_1_2_9_37_2 doi: 10.1109/SP.2015.54 – ident: e_1_2_9_7_2 – ident: e_1_2_9_38_2 doi: 10.1109/COMPSAC.2014.62 – ident: e_1_2_9_9_2 doi: 10.1145/1029894.1029911 – ident: e_1_2_9_13_2 doi: 10.1109/ISSREW.2014.26 – ident: e_1_2_9_19_2 – ident: e_1_2_9_2_2 doi: 10.1145/2408776.2408795 – ident: e_1_2_9_16_2 – ident: e_1_2_9_23_2 doi: 10.1145/2508859.2516736 – ident: e_1_2_9_36_2 doi: 10.1145/2508859.2516665 |
| SSID | ssj0021518 |
| Score | 2.1454382 |
| Snippet | Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly. In this paper, a static analysis method... |
| SourceID | proquest crossref hindawi emarefa |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Artificial intelligence Automation Buffers Classifiers Engineering International conferences Machine learning Overflow Programming languages Recall Servers Software engineering Source code |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFH64gh5c6latMod6ktCkWSZzEhWLB1uLqPQWMktqoaZqW_37vpdOqyDqwdtAhiHhm7d8kzffA6hGmRQkMkQ6ldwJONpcmmrpCBVFoc6QkaWFiOs1b7XiTke07YHb0JZVTn1i4aj1QNEZeQ3JsR8Eou6K0-cXh7pG0d9V20JjHhZJqQz3-eL5Zat9O6NcGM8ml-HqpM7nd6al72GIrN_jNeqw7ZNg_5egtGyeUhxgpFp-JF783vvmp4vg01j_72tvwJpNO9nZZJ9swpzJS7BuU1BmDXxYgtUv-oRb0ETwyAfkXdbL2Rld4KDxIGPnY-qrwm7QELL-4J09jPskX11U2iL3Zm-9lDWLOk3DrIRrdxvuG5d3F1eO7b_gKD9yR04QK0_GWshQSuHFsTCmLnmEKZoKOaaC0k1V4OpAe8bQV3qYDHgyldqVsSGVmx1YyAe52QOGPE1LHihkewEJ0khudKilSDOXS879MpxMAUiUFSenHhn9pCApYZgQXImFqwzHs9nPE1GOH-btWiw_p2EChOG4DFWL7R8LVKaoJta2h8knpPu_Pz6AFVpscmBTgYXR69gcwpJ6G_WGr0d2q34AzVTs1w priority: 102 providerName: ProQuest |
| Title | Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning |
| URI | https://search.emarefa.net/detail/BIM-1190718 https://dx.doi.org/10.1155/2017/5452396 https://www.proquest.com/docview/1983449209 |
| Volume | 2017 |
| WOSCitedRecordID | wos000419044200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: P5Z dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: K7- dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: M7S dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: Middle East & Africa Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: CWDGH dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.proquest.com/middleeastafrica providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: BENPR dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: PIMPY dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Open Access customDbUrl: eissn: 1563-5147 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: 24P dateStart: 19950101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ6ISuLF9wNFsgc8mSYttN3uUY0Go2CDj6CXptvdIgkWIyB_35myaJQYvTTbdLtJZ3f6zdfOfgNQ9VMpSGSIdCq55XL0uThW0hKJ73sqRUYW5yKu17zVCjodERqRpOH8L3xEO6TnDpJ2FxmT8AtQCDzK3Go3Op-8CkFruuOtRhJ89c4sv_3Hvd-Qp6hfYmwgHBWfifxOenMv4xxhLtZh1YSG7GQ6lxuwoLNNWDNhIjNOONyCJpqUPDPrsl7GTmhbBbUHKTsdU7UTdoPLM-0PJuxh3CdR6Tz_FRkxe-_FrJlnT2pmhFW723B_cX531rBMVQQrqfv2yHKDxJGBEtKTUjhBILSuSe5j4JR4HAM0aceJaytXOVpTEQ0HIdqRsVS2DDRpz-zAYjbI9B4wZE9KcjdBDuaSTIzkWnlKiji1ueS8XoLjmcWixEiGU-WKfpRTB8-LyL6RsW8Jjj57v06lMn7pt2uM_9UNwxIEyRJUzWT8MUB5NlOR8bhh5Ah6WFGzxf7_RjmAFTqdfk4pw-LobawPYTl5H_WGbxVYOj1vhe0KFK64VaGM0Fs8ht4TXgkvm-FjJV-DH7WCzDc |
| linkProvider | Hindawi Publishing |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LT9tAEB7RUER7KC19hQLdA_SCLPxe74EDhUIQSdoDLbkZ78NgKXUoToj6p_obO-OsAalqe-LAbSWvV7L3m8dnz34DsBHnUpDIEOlUcifkaHNZpqUjVBxHOkdGltUirl3e7yeDgfgyB7-aszBUVtn4xNpR65Gib-TbSI6DMBS-K2wF5bH5OUV-Vu0c7eNmbvr-waeTvY5jWwg4KojdsRMmypOJFjKSUnhJIozxJY8xy1ARx2xGupkKXR1qzxha38N45slMalcmhoRacN0Plz8c6lJFf3Nty45HMJ_EGMhbML93un_YuaF4ePfs8J1PaoDBoCm1j6Jtn5SqqaN3QA0C7gTBBfM9wwFGxoUL4uHT4o-4UAe7g6WH9pqewzObVrPdmR28gDlTLsOSTbGZdWDVMjy9o7_4EnoITvJx5TkrSrZLB1RoPMrZxwn1jWGf0dDz4WjKvk2GJM9dVxIXpmLXRcZ6dR2qYVai9vwVfL2Xp34NrXJUmrfAkIdqyUOFbDYkwR3JjY60FFnucsl50IatZsNTZcXXqQfIMK1JWBSlBI_UwqMNmzezL2eiI3-Z98Zi53YaJniYbrRhw2LpPwusNihKre-q0lsIrfz78ntY7Jz0umn3qH_8Dp7QwrOPU6vQGl9NzBo8Vtfjorpat2bC4Oy-Ufgb6w1Itg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VQhE9UCiPLhTwoT2haPOw4_iAUKGsqNouewC06iXEsVMiLdnS7HbVv9Zfx0zitJUQcOqBm6VYjhJ_8_iS8TcAW3GhFYkMkU6l9LhEm8syoz2Vx7EwBTKyrBFxPZDDYTIeq9ESXHRnYaissvOJjaM205y-kfeRHEecq9BX_cKVRYx2B29PfnrUQYr-tHbtNFqI7NvzBdK3-s3eLu71dhgOPnx-_9FzHQa8PIr9mceTPNCJUVporYIkUdaGWsaYhORCYrKj_SznvuEmsJZuH2C4C3Smja8TSzouuO4tuC15nFA52UgcXZI9nNgewwtJFzAad0X3QvRD0qym3t4RtQq4Fg5X7I8MBxgjV74TI1-Uv0WIJuwN1v7nF_YA7rtkm-201vEQlmy1Dmsu8WbOrdXrsHpNlfERHCJkyfNVx6ys2A4dW6HxtGDv5tRNhn1C8y8m0wX7Op-QaHdTX1zamp2VGTtsqlMtc8K1x4_hy4084hNYrqaV3QCG7NRoyXPkuJxkeLS0RhitssKXWsqoB6-7zU9zJ8lOnUEmaUPNhEgJKqmDSg-2L2eftFIkf5j31OHoahqmfZiE9GDL4eofC2x2iEqdR6vTKzg9-_vlV3AXcZYe7A33n8M9Wrf9YrUJy7PTuX0Bd_KzWVmfvmzshcG3m8bbLx7UUFE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assisting+in+Auditing+of+Buffer+Overflow+Vulnerabilities+via+Machine+Learning&rft.jtitle=Mathematical+problems+in+engineering&rft.au=Meng%2C+Qingkun&rft.au=Feng%2C+Chao&rft.au=Zhang%2C+Bin&rft.au=Tang%2C+Chaojing&rft.date=2017-01-01&rft.issn=1024-123X&rft.eissn=1563-5147&rft.volume=2017&rft.issue=1&rft_id=info:doi/10.1155%2F2017%2F5452396&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2017_5452396 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1024-123X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1024-123X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1024-123X&client=summon |