{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:53:31Z","timestamp":1743072811132,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004202"},{"type":"electronic","value":"9783540364139"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36413-7_16","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:44:57Z","timestamp":1184600697000},"page":"219-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"16_CR1","unstructured":"W. A. Arbaugh, G. Ballintijn, L. van Doorn: Signed Executables for Linux. Tech. Report CS-TR-4259. University of Maryland, June 4, 2001"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"W. Arbaugh, D. Farber, J. Smith: A Secure and Reliable Bootstrap Architecture. Proceedings of 1997 IEEE Symposium on Security and Privacy, pp. 65\u201371. May 1997.","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"16_CR3","unstructured":"S. Cesare: Unix ELF parasites and virus. Unpublished technical report. http:\/\/www.big.net.au\/~silvio\/elf-pv.txt"},{"key":"16_CR4","unstructured":"S. Cesare: Runtime Kernel KMEM Patching. Unpublished technical report. http:\/\/www.big.net.au\/~silvio\/runtime-kernel-kmem-patching.txt"},{"key":"16_CR5","unstructured":"C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. Proc. 7th USENIX Security Conference, pp. 63\u201378. San Antonio Texas, Jan. 1998"},{"key":"16_CR6","unstructured":"C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole: Buffer Overflows: Attacks and Defenses for the Vulnerability of the decade. DARPA Information Survivability Conference an Expo (DISCEX). Hilton Head Island SC, Jan. 2000"},{"key":"16_CR7","unstructured":"Halflife: Bypassing Integrity Checking Systems. Phrack, issue 51. September 1997."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"N. Itoi, W. A. Arbaugh, S. J. Pollak, D. M. Reeves: Personal Secure Booting. Proceedings of Australian Conference on Information Security and Privacy, pp. 130\u2013144. Sydney, July 11\u201313, 2001","DOI":"10.1007\/3-540-47719-5_12"},{"key":"16_CR9","unstructured":"Tool Interface Standards Committee: Tool Interface Standards (TIS) Portable Formats Specification version 1.1. http:\/\/developer.intel.com\/vtune\/tis.htm, October 1993"},{"key":"16_CR10","unstructured":"H. Lu: ELF: From the programmer perspective. http:\/\/citeseer.nj.nec.com\/lu95elf.html. May 17, 1995"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"G. H. Kim, E. H. Spafford: The design and Implementation of Tripwire: a System Integrity Checker. Proceedings of Conference on Computer and Communications Security, pages 18\u201329. Fairfax (Virginia), 2\u20134 November 1994","DOI":"10.1145\/191177.191183"},{"key":"16_CR12","unstructured":"G. H. Kim, E. H. Spafford: Experiences with Tripwire: Using integrity checkers for intrusion detection. In Systems Administration, Networking and Security Conference III. USENIX, April 1994."},{"key":"16_CR13","unstructured":"C. Ko, T. Fraser, L. Badger, D. Klipatrick: Detecting and Countering System Intrusions Using Software Wrappers. Proceedings of the 9th USENIX Security Symposium. Denver, Colorado, August 14\u201317, 2000."},{"key":"16_CR14","unstructured":"J. Linn: Privacy Enhancement for Internet Electronic Mail. PKIX Working Group, RFC1421, February, 1993."},{"key":"16_CR15","unstructured":"RSA Laboratories: PKCS7 Cryptographic Message Syntax Standard. ftp:\/\/www.rsasecurity.com, November 1, 1993"},{"key":"16_CR16","unstructured":"S. McCanne, V. Jacobson: The BSD Packet Filter: a new architecture for user-level packet capture. Proceedings of the 1993 winter USENIX conference, pp. 259\u2013269. San Diego CA, 1993."},{"key":"16_CR17","unstructured":"Sun Microsystems Corporation: Java Code Signing. http:\/\/java.sun.com\/security\/codesign, 1996"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk, and D. Solo: Internet X509 Public Key Infrastructure: Certificate and CRL Profile. Network Working Group, RFC 3280, April, 2002","DOI":"10.17487\/rfc3280"},{"key":"16_CR19","unstructured":"RSA Laboratories: RSAREF: A Cryptographic Toolkit for Privacy-Enhanced Mail. http:\/\/www.aus.rsa.com, 1994"},{"key":"16_CR20","unstructured":"SD: Linux on-the-fly kernel patching without LKM. Phrack issue 58, December 2001"},{"key":"16_CR21","unstructured":"Sun Microsystems: JavaTM Security Evolution and Concepts. Technical Articles. http:\/\/developer.java.sun.com\/"},{"key":"16_CR22","unstructured":"D. Stinson: Cryptography: Theory and Practice. CRC Press."}],"container-title":["Lecture Notes in Computer Science","Security in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36413-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T11:33:37Z","timestamp":1737286417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36413-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004202","9783540364139"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-36413-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}