{“id”:“https://openalex.org/W3084204810“,”doi“:”https://doi.org/10.1186/s42400-020-00058-2“,”title“:“ELAID:通过轻量级和准确的静态分析检测integer-Overflow-to-Buffer-Overflow漏洞”,“display_name”:“ELIAD:通过轻型和准确的动态分析检测interger-Oversflow-to Buffer-Overflow漏洞“,”publication_year“:2020,”publiation_date“:”2020-09-08“,”ids“:{”openalex“:”https://openalex.org/W3084204810“,”doi“:”https://doi.org/10.1186/s42400-020-00058-2“,”mag“:”3084204810“},”language“:”en“,”primary_location“:{”is_oa“:true,”landing_page_url“:”https://doi.org/10.1186/s42400-020-00058-2,“pdf_url”:https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00058-2,“源”:{“id”:https://openalex.org/S3035238565“,”display_name“:”Cybersecurity“,”issn_l“:”2523-3246“,”isn“:[”25233-246“],”is_oa“:true,”is-in_doaj“:true,”is_core“:真,”host_organization“:”https://openalex.org/P4310319965“,”“host_organization_name”:“Springer Nature”,“host_organization_lineage”:[“https://openalex.org/P4310319965“],”host_organization_lineage_names“:[”Springer Nature“],“type”:“journal”},“license”:“cc-by”,“licence_id”:“https://openalex.org/licenses/cc-by“,”version“:”publishedVersion“,”is_accepted“:true,”is_published“:true},”type“:”article“,”type_crossref“:“journal-article”,”indexed_in“:[”crossref“,”doaj“],”open_access“:{”is_oa“:true,”oa_status“:”gold“,”oa_url“:”https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00058-2“,”any_repository_has_fulltext“:false},”authorships“:[{”author_position“:”第一“,”作者“:{”id“:”https://openalex.org/A5000030352“,”display_name“:”Lili Xu“,”orcid“:”https://orcid.org/0000-0001-6899-971X“},”机构“:[{”id“:”https://openalex.org/I4210156404“,”display_name“:”信息工程研究所“,”ror“:”https://ror.org/04r53se39“,”“country_code”“:”CN“,”type“:”facility“,”lineage“:[”https://openalex.org/I19820366","https://openalex.org/I4210156404“]},{”id“:”https://openalex.org/I19820366“,”display_name“:”中国科学院“,”ror“:”https://ror.org/034t30j35“,”country_code“:”CN“,”type“:“政府”,”世系“:[”https://openalex.org/I19820366“]}],“国家”:[“CN”],“is_corresponding”:true,“raw_author_name”:“Lili Xu”,“raw_affiation_string”:[“中国科学院信息工程研究所,中国北京”],“附属机构”:[{“raw_affiation_string”:“中国科学院信息工程研究所,中国北京”,“institution_ids”:[https://openalex.org/I4210156404","https://openalex.org/I19820366“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5068078125“,”display_name“:”Mingjie Xu“,”orcid“:”https://orcid.org/0000-0002-5923-2901“},”机构“:[{”id“:”https://openalex.org/I4210156404“,”display_name“:”信息工程研究所“,”ror“:”https://ror.org/04r53se39“,”“country_code”“:”CN“,”type“:”facility“,”lineage“:[”https://openalex.org/I19820366","https://openalex.org/I4210156404“]},{”id“:”https://openalex.org/I19820366“,”display_name“:”中国科学院“,”ror“:”https://ror.org/034t30j35“,”country_code“:”CN“,”type“:“政府”,”世系“:[”https://openalex.org/I19820366“]}],”countries“:[”CN“],”is_corresponding“:false,”raw_author_name“:”Mingjie Xu“,”raw _ afiliation_strings“:【”中国科学院信息工程研究所,北京“】,”affiliations“:[{”raw_ afiliation _string“:”中国科学学院信息工程研究院,北京“,”institution_ids“:[“”https://openalex.org/I4210156404","https://openalex.org/I19820366“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5081844561“,”display_name“:”Feng Li“,”orcid“:”https://orcid.org/0000-0001-8833-5574“},”机构“:[{”id“:”https://openalex.org/I4210156404“,”display_name“:”信息工程研究所“,”ror“:”https://ror.org/04r53se39“,”“country_code”“:”CN“,”type“:”facility“,”lineage“:[”https://openalex.org/I19820366","https://openalex.org/I4210156404“]},{”id“:”https://openalex.org/I19820366“,”display_name“:”中国科学院“,”ror“:”https://ror.org/034t30j35“,”country_code“:”CN“,”type“:“政府”,”世系“:[”https://openalex.org/I19820366“]}],”国家“:[”CN“],”is_corresponding“:false,”raw_author_name“:”Feng Li“,”rau_affiliation_strings“:[“中国科学院信息工程研究所,北京”],”affiliations“:[{”raw_affiliation_string“:”中国科学院北京信息工程研究院“,”institution_ids“:[https://openalex.org/I4210156404","https://openalex.org/I19820366“]}]},{”author_position“:”last“,”author“:{”id“:”https://openalex.org/A5050683592“,”display_name“:”卫火“,”兽人“:”https://orcid.org/0009-0000-7121-1196“},”机构“:[{”id“:”https://openalex.org/I4210156404“,”display_name“:”信息工程研究所“,”ror“:”https://ror.org/04r53se39“,”“country_code”“:”CN“,”type“:”facility“,”lineage“:[”https://openalex.org/I19820366","https://openalex.org/I4210156404“]},{”id“:”https://openalex.org/I19820366“,”display_name“:”中国科学院“,”ror“:”https://ror.org/034t30j35“,”country_code“:”CN“,”type“:“政府”,”世系“:[”https://openalex.org/I19820366“]}],”国家“:[”CN“],”is_corresponding“:false,”raw_author_name“:”Wei Huo“,”raw _ afiliation_strings“:[“中国科学院信息工程研究所,北京”],”affiliations“:[{”raw_ afiliation _string“:”中国科学院北京信息工程研究院“,”institution_ids“:[https://openalex.org/I4210156404","https://openalex.org/I19820366“]}]}],”countries_disticont_count“:1,”institutions_disticent_count”:2,”corresponding_author_ids“:[”https://openalex.org/A5000030352“],”对应的机构ID“:[”https://openalex.org/I4210156404","https://openalex.org/I19820366“],”apc_list“:{“value”:0,”currency“:”USD“,”value_USD“:0,“provenance”:“doaj”},“apc_payed”:{”value“:0”,“currench”:“USD”,“value_USD”:0、“provennce”:“doaj”{,“fwci”:0.156,“has_fulltext”:false,“cited_by_count”:2,“cited_by_percentile_year”:{“min”:73,“max”:77},”biblio“:{“volume”:“3”,“issue”:“1”,“first_page”:null,“last_page”:null},“is_retracted”:falseis_paratext“:false,”primary_topic“:{”id“:”https://openalex.org/T11424“,”display_name“:”基于语言的信息流安全“,”score“:0.9996,”subfield“:{”id“:”https://openalex.org/subfields/s702“,”display_name“:”人工智能“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T11424“,”display_name“:”基于语言的信息流安全“,”score“:0.9996,”subfield“:{”id“:”https://openalex.org/subfields/s702“,”display_name“:”人工智能“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T10743“,”“display_name”:“自动化软件测试技术”,“score”:0.9978,“subfield”:{“id”:“https://openalex.org/subfields/1712“,”display_name“:”软件“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:0.9973,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”Physical Sciences“}}],”keywords“:[{”id“:”https://openalex.org/keywords/security-analysis网站“,”display_name“:”安全分析“,”score“:0.536102}],”concepts“:[{”id“:”https://openalex.org/C40842320,“wikidata”:https://www.wikidata.org/wiki/Q19423“,”display_name“:”缓冲区溢出“,”level“:2,”score“:0.868796},{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.7958799},{”id“:”https://openalex.org/C6311602,“wikidata”:https://www.wikidata.org/wiki/Q7676227“,”display_name“:”Taint checking“,”level“:3,”score“:0.71635735},{”id“:”https://openalex.org/C64869954,“wikidata”:https://www.wikidata.org/wiki/Q1859747“,”display_name“:”假阳性悖论“,”level“:2,”score“:0.6347107},{”id“:”https://openalex.org/C95713431,“wikidata”:https://www.wikidata.org/wiki/Q631425“,”display_name“:”漏洞(计算)“,”level“:2,”score“:0.6165098},{”id“:”https://openalex.org/C2778770139,“wikidata”:https://www.wikidata.org/wiki/Q1966904“,”display_name“:”Solver“,”level“:2,”score“:0.5871291},{”id“:”https://openalex.org/C97137487,“wikidata”:https://www.wikidata.org/wiki/Q729138“,”display_name“:”整数(计算机科学)“,”level“:2,”score“:0.56355387},{”id“:”https://openalex.org/C102379954,“wikidata”:https://www.wikidata.org/wiki/Q2589940“,”display_name“:”调用图“,”level“:2,”score“:0.5597223},{”id“:”https://openalex.org/C97686452,“wikidata”:https://www.wikidata.org/wiki/Q7604153“,”display_name“:”静态分析“,”level“:2,”score“:0.5444466},{”id“:”https://openalex.org/C111219384,“wikidata”:https://www.wikidata.org/wiki/Q6954384“,”display_name“:”NIST“,”level“:2,”score“:0.54332495},{”id“:”https://openalex.org/C2779639559,“wikidata”:https://www.wikidata.org/wiki/Q7661178“,”display_name“:”符号执行“,”level“:3,”score“:0.53366184},{”id“:”https://openalex.org/C79581498,“wikidata”:https://www.wikidata.org/wiki/Q1367530“,”display_name“:”Suite“,”level“:2,”score“:0.52772844},{”id“:”https://openalex.org/C151552104,“wikidata”:https://www.wikidata.org/wiki/Q7705809“,”display_name“:”测试套件“,”level“:4,”score“:0.5031113},{”id“:”https://openalex.org/C62913178,“wikidata”:https://www.wikidata.org/wiki/Q7554361“,”“display_name”“:”“软件安全保证”“,”级别“:4,”分数“:0.5008297},{”id“:”https://openalex.org/C56086750,“wikidata”:https://www.wikidata.org/wiki/Q6042592“,”display_name“:”整数编程“,”level“:2,”score“:0.47809502},{”id“:”https://openalex.org/C167063184,“wikidata”:https://www.wikidata.org/wiki/Q1400839“,”display_name“:”漏洞评估“,”level“:3,”score“:0.44151217},{”id“:”https://openalex.org/C2777904410,“wikidata”:https://www.wikidata.org/wiki/Q7397“,”display_name“:”软件“,”级别“:2,”分数“:0.4185702},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.4079455},{”id“:”https://openalex.org/C128942645,“wikidata”:https://www.wikidata.org/wiki/Q1568346“,”display_name“:”测试用例“,”level“:3,”score“:0.3183583},{”id“:”https://openalex.org/C199360897,“wikidata”:https://www.wikidata.org/wiki/Q9143“,”display_name“:”编程语言“,”level“:1,”score“:0.27457017},{”id“:”https://openalex.org/C11413529,“wikidata”:https://www.wikidata.org/wiki/Q8366“,”display_name“:”Algorithm“,”level“:1,”score“:0.20012987},{”id“:”https://openalex.org/C154945302,“wikidata”:https://www.wikidata.org/wiki/Q11660“,”display_name“:”人工智能“,”level“:1,”score“:0.13999307},{”id“:”https://openalex.org/C527648132,“wikidata”:https://www.wikidata.org/wiki/Q189900“,”display_name“:”信息安全“,”level“:2,”score“:0.12562066},{”id“:”https://openalex.org/C119857082,“wikidata”:https://www.wikidata.org/wiki/Q2539“,”display_name“:”机器学习“,”level“:1,”score“:0.11177561},{”id“:”https://openalex.org/C15744967,“wikidata”:https://www.wikidata.org/wiki/Q9418“,”display_name“:”心理学“,”等级“:0,”分数“:0.0},{”id“:”https://openalex.org/C152877465,“wikidata”:https://www.wikidata.org/wiki/Q208042(网址:https://www.wikidata.org/wiki/Q208042)“,”display_name“:”回归分析“,”level“:2,”score“:0.0},{”id“:”https://openalex.org/C166957645,“wikidata”:https://www.wikidata.org/wiki/Q23498“,”display_name“:”考古学“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C204321447,“wikidata”:https://www.wikidata.org/wiki/Q30642“,”display_name“:”自然语言处理“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C2989905,“wikidata”:https://www.wikidata.org/wiki/Q7445066“,”display_name“:”安全服务“,”level“:3,”score“:0.0},{”id“:”https://openalex.org/C137176749网址,“wikidata”:https://www.wikidata.org/wiki/Q4105337“,”display_name“:”心理弹性“,”level“:2,”score“:0.0},{”id“:”https://openalex.org/C542102704,“wikidata”:https://www.wikidata.org/wiki/Q183257“,”display_name“:”心理治疗师“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C95457728,“wikidata”:https://www.wikidata.org/wiki/Q309“,”display_name“:”History“,”level“:0,”score“:0.0}],”mesh“:[],”locations_count“:2,”location“:[{”is_oa“:true,”landing_page_url“:”https://doi.org/10.1186/s42400-020-00058-2,“pdf_url”:https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00058-2,“源”:{“id”:https://openalex.org/S3035238565“,”display_name“:”Cybersecurity“,”issn_l“:”2523-3246“,”isn“:[”25233-246“],”is_oa“:true,”is-in_doaj“:true,”is_core“:真,”host_organization“:”https://openalex.org/P4310319965“,”“host_organization_name”:“Springer Nature”,“host_organization_lineage”:[“https://openalex.org/P4310319965“],”host_organization_lineage_names“:[”Springer Nature“],“type”:“journal”},“license”:“cc-by”,“licence_id”:“https://openalex.org/licenses/cc-by“,”version“:”publishedVersion“,”is_accepted“:true,”is_published“:true},{”is_oa“:false,”landing_page_url“:”https://doaj.org/article/e4dce26b95a9424cbc4f7f5011ff8c3a“,”pdf_url“:空,”源“:{”id“:”https://openalex.org/S4306401280“,”display_name“:”DOAJ(DOAJ:开放存取期刊目录)“,”issn_l“:null,”issn“:null:”is_oa“:true,”is_in_DOAJ“:false,”is_core“:false,”host_organization“:null,”host_organization_name“:null,“host_orgganization_lineage”:[],“host_orgganization _lineage_names”:[[],”type“:”repository“}”,“license”:nullis_accepted“:false,”is_published“:false}],”best_oa_location“:{”is_oa“:true,”landing_page_url“:”https://doi.org/10.1186/s42400-020-00058-2,“pdf_url”:https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00058-2,“源”:{“id”:https://openalex.org/S3035238565“,”display_name“:”Cybersecurity“,”issn_l“:”2523-3246“,”isn“:[”25233-246“],”is_oa“:true,”is-in_doaj“:true,”is_core“:真,”host_organization“:”https://openalex.org/P4310319965“,”“host_organization_name”:“Springer Nature”,“host_organization_lineage”:[“https://openalex.org/P4310319965“],”host_organization_lineage_names“:[”Springer Nature“],“type”:“journal”},“license”:“cc-by”,“licence_id”:“https://openalex.org/licenses/cc-by“,”version“:”publishedVersion“,”is_accepted“:true,”is_published“:true},”sustainable_development_goals“:[{”id“:”https://metadata.un.org/sdg/16“,”score“:0.72,”display_name“:”Peace,justice,and strong institutions“}],”grants“:[],”datasets“:【】,”versions“:【],”referenced_works_count“:6,”referrenced_works“:[”https://openalex.org/W1542462119","https://openalex.org/W1993736952","https://openalex.org/W2297774820","https://openalex.org/W229894388","https://openalex.org/W2915571968","https://openalex.org/W4246166885“],”related_works“:[”https://openalex.org/W3084204810","https://openalex.org/W3082197745","https://openalex.org/W2905611097","https://openalex.org/W2755634893","https://openalex.org/W2394695306","https://openalex.org/W2062143426","https://openalex.org/W2014320173","https://openalex.org/W2009637593","https://openalex.org/W1637912404","https://openalex.org/W1507845365“],”ngrams_url“:”https://api.openalex.org/works/W3084204810/ngrams“,”“abstract_inverted_index”:{“abstract”:[0],“The”:[1153],“Integer-Overflow-to-Buffer-Overflow”:[2],“(IO2BO)”:[3],“漏洞”:[4,23107],“has”:[5],“been”:[6,33],“广泛”:[7],“利用”:[8],“by”:[9],“攻击者”:[10],“to”:[11,15,35,77,89115118],“原因”:[12],“严重”:[13],“损坏”:[14],“计算机”:[16],“系统”:[17],“自动”:[18],“识别“:[19],”this“:[20,55,58],”kind“:[21],”of“:[22,45138],”is“:[24],”critical“:[25],”for“:[26],”software“:[27],”security“。“:[28],”尽管“:[29],”许多“:[30],”工作“:[31],”有“:[32123],”已完成“:[34],”缓解“:[36],”整数“:[37],”溢出“:[38],”现有“:[39],”工具“:[40],”任其一“:[41],”报告“:[42],”大“:[43],”数字“:[44],”假“:[46,93],”正“:[47],”或“:[48],”介绍“:[49],”不可接受“:[50],”时间“:[51],”消耗。“:[52],“收件人”:[53],“地址”:[54],“问题”:[56],“in”:[57150],“文章”:[59],“我们”:[60],“现在”:[61],“a”:[62,86104125],“静态”:[63],“分析”:[64,76],“框架。”:[65],“It”:[66],“first”:[67],“constructs”:[68],“an”:[69],“inter-procedural”:[70],“call”:[71],“图形”:[72],“和”:[73111132145162],“利用”:[74],“污染”:[75],“准确”:[78],“识别“:[79],”潜在“:[80105],”IO2BO“:[81106148167],”漏洞。“:[82168],”Then“:[83],”it“:[84,96134],”uses“:[85],”lightweight“:[87],”method“:[88],”further“:[90],”filter“:[91],”out“:[92],”positives“。“:[94],”具体来说,“:[95],”生成“:[97],”约束“:[98114],”表示“:[99],”:[100113139],“条件”:[101],“under”:[102],“which”:[103],“can”:[108160],“be”:[109],“triggered”:[110],“feeds”:[112],“SMT”:[116],“solver”:[117],“decide”:[119],“their”:[120],“可满足性。“:[121],“我们”:[122],“实现”:[124],“原型”:[126],“系统”:[127159],“ELAID”:[128],“基于”:[129],“on”:[130135],“LLVM”:[131],“评估”:[133],“228”:[136],“程序”:[137],“NIST\u2019s”:[140],“SAMATE”:[141],“朱丽叶”:[142],“测试”:[143],“套件”:[144],“14”:[146],“已知”:[147166],“漏洞”:[149],“真实”:[151],“世界”。“:[152],”实验“:[154],”结果“:[155],”显示“:[156],”那“:[157],”我们的“:[158],”有效“:[161],”高效“:[163],”检测“:[164],”全部“:[165]},”引用_by_api_url“:”https://api.openalex.org/works?filter=cites:W3084204810“,”counts_by_year“:[{”年份“:2024,”cited_by_count“:1},{”年“:2021,”cited_by_count”:1}],”更新日期“:“2024-06-25T07:34:36.396975”,”创建日期“:”2020-09-14“}