{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T10:50:34Z","timestamp":1725187834316},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg Artificial Intelligence, Autonomous Systems, and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tse.2019.2946148","type":"journal-article","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T20:02:28Z","timestamp":1570564948000},"page":"2225-2241","source":"Crossref","is-referenced-by-count":17,"title":["IntRepair: Informed Repairing of Integer Overflows"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2462-7612","authenticated-orcid":false,"given":"Paul","family":"Muntean","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8634-2367","authenticated-orcid":false,"given":"Hao","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1093-1282","authenticated-orcid":false,"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"The language toolkit: An API for automated refactorings in eclipse-based IDEs","year":"0"},{"key":"ref38","article-title":"Codan-C\/C++ static analysis framework for CDT","author":"laskavaia","year":"2011","journal-title":"EclipseCon"},{"key":"ref33","author":"gamma","year":"1994","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"ref32","author":"barrett","year":"2010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335070"},{"key":"ref30","first-page":"295","article-title":"Repairing programs with semantic code search","author":"yalin","year":"2015","journal-title":"Proc 30th IEEE\/ACM Int Conf Automated Softw Eng"},{"key":"ref37","article-title":"Eclipse CDT.","year":"0"},{"key":"ref36","first-page":"1","article-title":"A fast and low-overhead technique to secure programs against integer overflows","author":"pereira","year":"2013","journal-title":"Proc IEEE\/ACM Int Symp Code Gener Optim"},{"key":"ref35","first-page":"760","article-title":"Understanding integer overflow in C\/C++","author":"dietz","year":"2012","journal-title":"Proc 34th Int'l Conf Software Eng"},{"key":"ref34","article-title":"Understanding integer overflow in C\/C++","author":"dietz","year":"2012","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115718"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606625"},{"key":"ref61","article-title":"Automatic error elimination by multi-application code transfer","author":"sidiroglou-douskos","year":"2014"},{"key":"ref28","article-title":"Numeric truncation error.","year":"0"},{"key":"ref27","article-title":"Unsigned to signed conversion error.","year":"0"},{"key":"ref29","article-title":"IO2BO: Integer overflow to buffer overflow.","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884820"},{"key":"ref22","article-title":"Integer underflow (wrap or wraparound).","year":"0"},{"key":"ref21","article-title":"Integer overflow or wraparound.","author":"corporation","year":"0"},{"key":"ref24","article-title":"Off-by-one error.","year":"0"},{"key":"ref23","article-title":"Integer coercion error.","year":"0"},{"key":"ref26","article-title":"Signed to unsigned conversion error.","year":"0"},{"key":"ref25","article-title":"Unexpected sign extension.","year":"0"},{"key":"ref50","first-page":"67","article-title":"Dynamic test generation to find integer bugs in x86 binary Linux programs","author":"molnar","year":"2009","journal-title":"Proc Usenix Security Symp"},{"key":"ref51","article-title":"Modular bug-finding for integer overflows in the large: Sound, efficient, bit-precise static analysis","author":"moy","year":"2009","journal-title":"MSR - TR 2009–179"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.70"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515929"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694389"},{"key":"ref55","article-title":"Automatic discovery and patching of buffer and integer overflow errors","author":"sidiroglou-douskos","year":"2015"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535888"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664282"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227146"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24255-2_32"},{"key":"ref40","article-title":"Eclipse JFace.","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0750"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref15","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref19","article-title":"RICH: Automatically protecting against integer-based vulnerabilities","author":"brumley","year":"2007","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref3","article-title":"IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution","author":"wang","year":"2009","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref7","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"ref46","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref45","article-title":"PREfast analysis tool.","year":"0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.77"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00071"},{"key":"ref41","article-title":"The GNU compiler collection.","year":"0"},{"key":"ref44","article-title":"UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries","author":"wojtczuk","year":"2005","journal-title":"Chaos Commun Congr (22C3)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_24"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9573514\/08862860.pdf?arnumber=8862860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:06Z","timestamp":1652194206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8862860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":62,"journal-issue":{"issue":"10"},"URL":"http:\/\/dx.doi.org\/10.1109\/tse.2019.2946148","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}