{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:21:15Z","timestamp":1761708075493},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000204"},{"type":"electronic","value":"9783540360841"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36084-0_15","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T21:40:00Z","timestamp":1179265200000},"page":"274-291","source":"Crossref","is-referenced-by-count":65,"title":["Accurate Buffer Overflow Detection via Abstract Pay load Execution"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Toth","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"15_CR1","unstructured":"AlephOne. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996."},{"key":"15_CR2","unstructured":"Debra Anderson, Thane Frivold, Ann Tamaru, and Alfonso Valdes. Next Generation Intrusion Detection Expert System (NIDES). SRI International, 1994."},{"key":"15_CR3","unstructured":"The Apache Software Foundation. http:\/\/www.apache.org ."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"M. Bykova, S. Ostermann, and B. Tjaden. Detecting network intrusions via a statistical analysis of network packet characteristics. In Proceedings of the 33rd Southeastern Symposium on System Theory, 2001.","DOI":"10.1109\/SSST.2001.918537"},{"key":"15_CR5","unstructured":"Crispin Cowan, Calton Pu, David Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. Automatic detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, January 1998."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dorothy Denning. An intrusion-detection model. In IEEE Symposium on Security and Privacy, pages 118\u2013131, Oakland, USA, 1986.","DOI":"10.1109\/SP.1986.10010"},{"key":"15_CR7","unstructured":"Laurent Eschenauer. Imsafe. http:\/\/imsafe.sourceforge.net , 2001."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. A sense of self for Unix processes. In Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120\u2013128. IEEE Computer Society Press, 1996.","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"15_CR9","unstructured":"The GNU Compiler Collection. http:\/\/gcc.gnu.org ."},{"key":"15_CR10","unstructured":"A. Ghosh and A. Schwartzbard. A study in using neural networks for anomaly and misuse detection. In USENIX Security Symposium, 1999."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Judith Hochberg, Kathleen Jackson, Cathy Stallins, J. F. McClary, David DuBois, and Josephine Ford. NADIR: An automated system for detecting network intrusion and misuse. Computer and Security, 12(3):235\u2013248, May 1993.","DOI":"10.1016\/0167-4048(93)90110-Q"},{"key":"15_CR12","unstructured":"Intel. IA-32 Intel Architecture Software Developer\u2019s Manual Volume 1\u20133, 2002. http:\/\/developer.intel.com\/design\/Pentium4\/manuals\/ ."},{"key":"15_CR13","unstructured":"Home of K2. http:\/\/www.ktwo.ca ."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Christopher Kruegel, Thomas Toth, and Clemens Kerer. Service Specific Anomaly Detection for Network Intrusion Detection. In Symposium on Applied Computing (SAC). ACM Scientific Press, March 2002.","DOI":"10.1145\/508791.508835"},{"key":"15_CR15","unstructured":"Mudge. Compromised: Buffer-Overflows, from Intel to SPARC Version 8. http:\/\/www.l0pht.com , 1996."},{"key":"15_CR16","unstructured":"Peter G. Neumann and Phillip A. Porras. Experience with EMERALD to date. In 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pages 73\u201380, Santa Clara, California, USA, April 1999."},{"key":"15_CR17","unstructured":"Phillip A. Porras and Peter G. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 20th NIS Security Conference, October 1997."},{"key":"15_CR18","unstructured":"Martin Roesch. Snort-Lightweight Intrusion Detection for Networks. In USENIX Lisa 99, 1999."},{"key":"15_CR19","unstructured":"SecurityFocus Corporate Site. http:\/\/www.securityfocus.com ."},{"key":"15_CR20","unstructured":"Jude Shavlik, Mark Shavlik, and Michael Fahland. Evaluating software sensors for actively profiling Windows 2000 computer users. In Recent Advances in Intrusion Detection (RAID), 2001."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"E. Spafford. The Internet Worm Program: Analysis. Computer Communication Review, January 1989.","DOI":"10.1145\/66093.66095"},{"key":"15_CR22","unstructured":"Stuart Staniford, James A. Hoagland, and Joseph M. McAlerney. Practical Automated Detection of Stealthy Portscans. In Proceedings of the IDS Workshop of the 7th Computer and Communications Security Conference, Athens, 2000."},{"key":"15_CR23","unstructured":"Giovanni Vigna and Richard A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. In 14th Annual Computer Security Applications Conference, December 1998."},{"issue":"1","key":"15_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1999-7103","volume":"7","author":"G. Vigna","year":"1999","unstructured":"Giovanni Vigna and Richard A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security, 7(1):37\u201371, 1999.","journal-title":"Journal of Computer Security"},{"key":"15_CR25","unstructured":"WebSTONE-Mindcraft Corporate Site. http:\/\/www.mindcraft.com ."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36084-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:51:41Z","timestamp":1556398301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36084-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000204","9783540360841"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-36084-0_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}