{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T16:17:58Z","timestamp":1738340278474,"version":"3.35.0"},"publisher-location":"Dordrecht","reference-count":36,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9781402087387"},{"type":"electronic","value":"9781402087394"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-1-4020-8739-4_86","type":"book-chapter","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T08:52:47Z","timestamp":1219135967000},"page":"485-493","source":"Crossref","is-referenced-by-count":6,"title":["Taxonomy of Linux Kernel Vulnerability Solutions"],"prefix":"10.1007","author":[{"given":"Serguei A.","family":"Mokhov","sequence":"first","affiliation":[]},{"given":"Marc-Andr\u00e9","family":"Laverdi\u00e8re","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Benredjem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","unstructured":"AusCERT. Secure unix programming checklist, 1996. http:\/\/www. auscert.org.au\/render.html?it=1975 ."},{"key":"86_CR2","unstructured":"BitKeeper. Bitkeeper, 2005. http:\/\/linux.bkbits.net\/ ."},{"key":"86_CR3","unstructured":"Bugtraq. Bugtraq, 2005. http:\/\/groups.google.ca\/group\/mailing.unix . bugtraq and http:\/\/www.securityfocus.com\/archive\/1 ."},{"key":"86_CR4","unstructured":"CERT. Cert advisories, 2005. http:\/\/www.us-cert.gov\/cas\/techalerts\/ index.html ."},{"key":"86_CR5","doi-asserted-by":"crossref","unstructured":"Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar, and K. Iyer. A data-driven finite state machine model for analyzing security vulnerabilities. In 2003 International Conference on Dependable Systems and Networks (DSN\u201903), page 605. IEEE, 2003.","DOI":"10.1109\/DSN.2003.1209970"},{"key":"86_CR6","unstructured":"Various Contributors. Linux Kernel Mailing List Archives via Google. 2005. http:\/\/groups.google.com\/groups?q=linux+kernel ."},{"key":"86_CR7","unstructured":"Debian. The debian\u2019s svn repository, 2005. http:\/\/svn.debian.org\/wsvn\/ kernel\/ ."},{"key":"86_CR8","doi-asserted-by":"crossref","unstructured":"Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of OSDI 2000. Usenix, 2000.","DOI":"10.21236\/ADA419626"},{"key":"86_CR9","doi-asserted-by":"crossref","unstructured":"David Evans and David Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan\/Feb 2002.","DOI":"10.1109\/52.976940"},{"key":"86_CR10","unstructured":"Steve Hamm. Linux inc. BusinessWeek Online, 01 2001. http:\/\/www. businessweek.com\/magazine\/content\/05 05\/b3918001 mz001.htm ."},{"key":"86_CR11","unstructured":"Brian Hatch, James Lee, and George Kurtz. Hacking Exposed Linux, 2nd Edition. McGraw-Hill Osborne Media, 2002."},{"key":"86_CR12","unstructured":"Simon Horman. Ultra monkey: Kernel security bug database, 2005. http:\/\/www.ultramonkey.org\/bugs\/cve\/ ."},{"key":"86_CR13","unstructured":"M. Howard and D. LeBlanc. Writing Secure Code, 2nd edition. Microsoft Press, 2002."},{"key":"86_CR14","unstructured":"Xie Huagang. Lids: Linux intrusion detection system. http:\/\/www.lids. org\/ ."},{"key":"86_CR15","doi-asserted-by":"crossref","unstructured":"Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan\u201cnoir\u201dEren, Neel Mehta, and Riley Hassell. The Shellcoder\u2019s Handbook : Discovering and Exploiting Security Holes. John Wiley & Sons, 2004.","DOI":"10.1016\/S0267-3649(04)00080-9"},{"key":"86_CR16","unstructured":"Macadamian. Macadamian\u2019s code review checklist. http:\/\/www.macadamian.com\/index.php?option=com content&task= view&id=27&Itemid=31 ."},{"key":"86_CR17","unstructured":"D. Mackenzie, P. Eggert, and R. Stallman. Comparing and Merging Files. Free Software Foundation, 2002. http:\/\/www.gnu.org\/software\/ diffutils\/manual\/ps\/diff.ps.gz ."},{"key":"86_CR18","unstructured":"Scott Mann, Ellen Mitchell, and Mitchell Krell. Linux System Security. Pearson Education, 2002."},{"key":"86_CR19","unstructured":"Sun Microsystems. Security code guidelines, 2000. http:\/\/java.sun.com\/ security\/seccodeguide.html ."},{"key":"86_CR20","unstructured":"NIST. National vulnerability database, 2005. http:\/\/nvd.nist.gov\/ ."},{"key":"86_CR21","unstructured":"NIST. National vulnerability database statistics, 2005. http:\/\/nvd.nist. gov\/statistics.cfm ."},{"key":"86_CR22","unstructured":"OpenWall. Openwall gnu\/*\/linux (owl) -a security-enhanced server platform. http:\/\/www.openwall.com\/Owl\/ ."},{"key":"86_CR23","unstructured":"Marc-Andr\u00e9 Laverdi\u00e8re-Papineau. Towards Systematic Software Security Hardening. Master\u2019s thesis, Concordia Institute for Information Systems Engineering, Concordia University, August 2007."},{"key":"86_CR24","doi-asserted-by":"crossref","unstructured":"B. Schwarz, Hao Chen, D. Wagner, J. Lin, Wei Tu, G. Morrison, and J. West. Model checking an entire linux distribution for security violations. In Proceedings of the 21st Annual Computer Security Applications Conference, pages 13\u201322. IEEE, 2005.","DOI":"10.1109\/CSAC.2005.39"},{"key":"86_CR25","unstructured":"R. Seacord. Secure Coding in C and C++. SEI Series. Addison-Wesley, 2005."},{"key":"86_CR26","unstructured":"Adam Shostack. Security code review guidelines, 2004. http:\/\/www. homeport.org\/ adam\/review.html ."},{"key":"86_CR27","unstructured":"Stephen Smalley, Chris Vance, and Wayne Salamon. Implementing selinux as a linux security module. http:\/\/www.nsa.gov\/selinux\/papers\/ module.pdf ."},{"key":"86_CR28","unstructured":"Visual Studio Team System. Guidelines for writing secure code. http:\/\/msdn2.microsoft.com\/en-us\/library\/ms182020.aspx ."},{"key":"86_CR29","unstructured":"Linus Torvalds. Linux kernel coding style. http:\/\/www.llnl.gov\/linux\/ slurm\/coding style.pdf ."},{"key":"86_CR30","unstructured":"Dimitri van Heesch. doxygen Manual for version 1.4.6. Doxygen, 2004. ftp:\/\/ftp.stack.nl\/pub\/users\/dimitri\/doxygen manual-1.4.6.pdf.zip ."},{"key":"86_CR31","unstructured":"Steven J. Vaughan-Nichols. Linux server market share keeps growing. Linux-Watch Online, May 2007. http:\/\/www.linux-watch.com\/news\/ NS5369154346.html ."},{"key":"86_CR32","unstructured":"D. Wheeler. Unix and linux secure coding howto, 2003."},{"key":"86_CR33","doi-asserted-by":"crossref","unstructured":"R. Wita and Y. Teng-Amnuay. Vulnerability profile for linux. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pages 953\u2013958. IEEE, 2005.","DOI":"10.1109\/AINA.2005.343"},{"key":"86_CR34","unstructured":"C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-hartman. Linux security modules: General security support for the linux kernel, 2002."},{"key":"86_CR35","unstructured":"Chris Wright. OOPS Linux Kernel Security Patches in the GIT Repository. 2005. http:\/\/www.kernel.org\/git\/?p=linux\/kernel\/git\/chrisw\/ stable-queue.git;a=tree ."},{"key":"86_CR36","unstructured":"Various Contributors and GNU Project. GNU Compiler Collection (GCC). Free Software Foundation, Inc., 1998-2005. http:\/\/gcc.gnu.org\/onlinedocs\/gcc\/"}],"container-title":["Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4020-8739-4_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T15:32:24Z","timestamp":1738337544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4020-8739-4_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9781402087387","9781402087394"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-1-4020-8739-4_86","relation":{},"subject":[]}}