{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:28:10Z","timestamp":1726406890059},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_1","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T06:36:57Z","timestamp":1159857417000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Extending .NET Security to Unmanaged Code"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Klinkoff","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Berkeley DB for .NET: \n                    \n                      http:\/\/sourceforge.net\/projects\/libdb-dotnet"},{"key":"1_CR2","unstructured":"Berman, A., Bourassa, V., Selberg, E.: TRON: Process-specific file protection for the UNIX operating system. In: Winter USENIX Technical Conference (1995)"},{"key":"1_CR3","unstructured":"Chari, S., Cheng, P.: BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. In: Network and Distributed Systems Security Symposium (NDSS) (2002)"},{"key":"1_CR4","unstructured":"CsGL, \n                    \n                      http:\/\/csgl.sourceforge.net\/"},{"key":"1_CR5","unstructured":".NET Framework Development Center, \n                    \n                      http:\/\/msdn.microsoft.com\/netframework\/"},{"key":"1_CR6","unstructured":"ECMA. ECMA 335 - Common Language Infrastructure Partitions I to VI, 3rd edn. (2005)"},{"key":"1_CR7","unstructured":"Feng, H., Giffin, J., Huang, Y., Jha, S., Lee, W., Miller, B.: Formalizing Sensitivity in Static Analysis for Intrusion Detection. In: IEEE Symposium on Security and Privacy (2004)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"1_CR9","volume-title":"Programming. NET Security","author":"A. Freeman","year":"2003","unstructured":"Freeman, A., Jones, A.: Programming. NET Security. O\u2019Reilly & Associates Inc., Sebastopol (2003)"},{"key":"1_CR10","volume-title":"Fundamentals of Software Engineering","author":"C. Ghezzi","year":"1991","unstructured":"Ghezzi, C., Jazayeri, M., Mandrioli, D.: Fundamentals of Software Engineering. Prentice Hall Inc., New York (1991)"},{"key":"1_CR11","unstructured":"Ghormley, D., Petrou, D., Rodrigues, S., Anderson, T.: SLIC: An Extensibility System for Commodity Operating Systems. In: USENIX Technical Conference (1998)"},{"key":"1_CR12","unstructured":"Goldberg, I., Wagner, D., Thomas, R., Brewer, E.: A secure environment for untrusted helper applications: Confining the wily hacker. In: 6th USENIX Security Symposium (1996)"},{"key":"1_CR13","unstructured":"Herzog, A., Shahmehri, N.: Using the Java Sandbox for Resource Control. In: 7th Nordic Workshop on Secure IT Systems (NordSec) (2002)"},{"key":"1_CR14","unstructured":"Hunt, G., Brubacher, D.: Detours: Binary Interception of Win32 Functions. In: 3rd USENIX Windows NT Symposium (1999)"},{"key":"1_CR15","unstructured":"Jain, K., Sekar, R.: User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In: Network and Distributed Systems Security Symposium (NDSS) (2000)"},{"key":"1_CR16","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure Execution Via Program Shepherding. In: 11th USENIX Security Symposium (2002)"},{"key":"1_CR17","unstructured":"Ko, C., Fraser, T., Badger, L., Kilpatrick, D.: Detecting and Countering System Intrusions Using Software Wrappers. In: 9th USENIX Security Symposium (2000)"},{"key":"1_CR18","unstructured":".NET Framework Class Library Documentation - Security.Permissions (2006), \n                    \n                      http:\/\/msdn.microsoft.com\/library\/en-us\/cpref\/html\/frlrfSystemSecurityP%ermissions.asp"},{"key":"1_CR19","volume-title":"Windows NT\/2000 Native API Reference","author":"G. Nebbett","year":"2000","unstructured":"Nebbett, G.: Windows NT\/2000 Native API Reference. New Riders Publishing, Thousand Oaks (2000)"},{"key":"1_CR20","unstructured":"OpenGL, \n                    \n                      http:\/\/www.opengl.org"},{"key":"1_CR21","unstructured":"Osterlund, R.: Windows 2000 Loader, What Goes On Inside Windows 2000: Solving the Mysteries of the Loader. MSDN Magazine (March 2002)"},{"key":"1_CR22","unstructured":"Russinovich, M., Cogswell, B.: Windows NT System-Call Hooking. Dr. Dobb\u2019s Journal (January 1997)"},{"key":"1_CR23","unstructured":"Sleepycat Software. Berkeley DB Database, \n                    \n                      http:\/\/www.sleepycat.com\/"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: IEEE Symposium on Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"1_CR25","unstructured":"Platform SDK: Windows API, \n                    \n                      http:\/\/www.microsoft.com\/msdownload\/platformsdk\/"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:14:40Z","timestamp":1619493280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11836810_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}