{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:31Z","timestamp":1771699831030,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":4,"publisher":"Springer New York","isbn-type":[{"value":"9781461409762","type":"print"},{"value":"9781461409779","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4614-0977-9_7","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T16:24:22Z","timestamp":1313771062000},"page":"117-130","source":"Crossref","is-referenced-by-count":20,"title":["End-to-End Software Diversification of Internet Services"],"prefix":"10.1007","author":[{"given":"Mihai","family":"Christodorescu","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Fredrikson","sequence":"additional","affiliation":[]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Jonathon","family":"Giffin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"7_CR1_7","unstructured":"Sql injections top attack statistics. Dark Reading: \n                  http:\/\/www.darkreading\n                  \n                . com\/database_security\/security\/app-security\/showArticle.jhtml? articleID=223100129, February 2010."},{"key":"7_CR2_7","unstructured":"Multiple facebook vulnerabilities reported on full-disclosure. Zero Day: \n                  http:\/\/www.zdnet.com\/blog\/security\/\n                  \n                 multiple-facebook-vulnerabilities-reported-on-full-disclosure\/ 1414, July 2008."},{"key":"7_CR3_7","unstructured":"PHP manual: Magic quotes. \n                  http:\/\/php.net\/manual\/en\/security\n                  \n                . magicquotes.php, September 2010."},{"key":"7_CR4_7","unstructured":"The web application security consortium: Web application security statistics. \n                  http:\/\/projects.webappsec.org\/Web-Application-Security-Statistics\n                  \n                , September 2010."}],"container-title":["Advances in Information Security","Moving Target Defense"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-0977-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T08:53:36Z","timestamp":1619859216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-0977-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781461409762","9781461409779"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_7","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}