{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:05:11Z","timestamp":1743037511742,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030420505"},{"type":"electronic","value":"9783030420512"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42051-2_17","type":"book-chapter","created":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T06:15:08Z","timestamp":1582179308000},"page":"242-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bunkers: Jail Application Level Firewall for the Mitigation and Identification of Service Takeover Attacks on HardenedBSD"],"prefix":"10.1007","author":[{"given":"Alin","family":"Anton","sequence":"first","affiliation":[]},{"given":"R\u0103zvan","family":"Cioarg\u0103","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,21]]},"reference":[{"key":"17_CR1","unstructured":"Arnautov, S., et al.: SCONE: secure linux containers with intel SGX. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 689\u2013703, USENIX Association, Savannah (2016)"},{"issue":"154","key":"17_CR2","first-page":"15","volume":"2007","author":"M Bauer","year":"2007","unstructured":"Bauer, M.: Paranoid penguin: introduction to seLinux. Linux J. 2007(154), 15 (2007)","journal-title":"Linux J."},{"key":"17_CR3","unstructured":"Crooks, A.: NetPGP and Signed Execution. https:\/\/www.netbsd.org\/agc\/netpgp-signedexec-2012.pdf. September 2012"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30036-8","volume":"2016","author":"S Furnell","year":"2016","unstructured":"Furnell, S.: Vulnerability management: not a patch on where we should be? Netw. Secur. 2016(4), 5\u20139 (2016)","journal-title":"Netw. Secur."},{"key":"17_CR5","unstructured":"Oracle Inc.: Enterprise Manager Ops Center User\u2019s Guide 11g Release 1 Update 3 (11.1.3.0.0) Chapter 12 Oracle Solaris Zones. Oracle Inc., November 2011"},{"key":"17_CR6","unstructured":"Kamp, P.-H., Watson, R.N.M.: Jails: confining the omnipotent root. In: Proceedings of the 2nd International SANE Conference (2000)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Kim, D., Kwon, B.J., Dumitra\u015f, T.: Certified malware: measuring breaches of trust in the windows code-signing PKI. In: Proceedings of the Conference on Computer and Communications Security, CCS 2017, pp. 1435\u20131448. ACM, New York (2017)","DOI":"10.1145\/3133956.3133958"},{"key":"17_CR8","unstructured":"Canonical Ltd.: Linux containers LXC (2019). https:\/\/linuxcontainers.org\/. Accessed 2019"},{"key":"17_CR9","unstructured":"Mattetti, M., Shulman-Peleg, A., Allouche, Y., Corradi, A., Dolev, S., Foschini, L.: Automatic security hardening and protection of linux containers. In: Workshop on Security and Privacy in the Cloud, September 2015"},{"key":"17_CR10","unstructured":"McCorkle, E.: A trust infrastructure for FreeBSD. In: BSDCan - The BSD Conference, Ottawa, June 2018"},{"key":"17_CR11","volume-title":"The design and implementation of the FreeBSD operating system","author":"MK McKusick","year":"2015","unstructured":"McKusick, M.K., Neville-Neil, G.V., Watson, R.N.M.: The design and implementation of the FreeBSD operating system, 2nd edn. Addison Wesley, Boston (2015)","edition":"2"},{"key":"17_CR12","unstructured":"Phrack: Hardening the Linux Kernel: Trusted Path Execution. Phrack Mag. 8(52), 6\u201320 (1998)"},{"key":"17_CR13","unstructured":"Rahimi, N.A.: Trusted Path Execution for the Linux 2.6 kernel as a Linux Security Module (2004)"},{"key":"17_CR14","unstructured":"Samarati, P.: Data security and privacy in the cloud. In: Proceedings of 10th International Conference on Information Security Practice and Experience (ISPEC 2014), Fuzhou, China, May 2014"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010. invited paper","DOI":"10.1145\/1755688.1755690"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-319-63688-7_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"M Stevens","year":"2017","unstructured":"Stevens, M., Bursztein, E., Karpman, P., Albertini, A., Markov, Y.: The first collision for full SHA-1. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 570\u2013596. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_19"},{"key":"17_CR17","unstructured":"The Grsecurity project: Filesystem hardening: Trusted Path Execution 2019. https:\/\/www.grsecurity.net. Accessed 2019"},{"key":"17_CR18","unstructured":"The NetBSD Project: The NetBSD Guide Part III chapter 20: NetBSD Veriexec subsystem (2019). https:\/\/www.netbsd.org\/docs\/guide\/en\/index.html"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19\u201335. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_2"},{"issue":"3","key":"17_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/2093548.2093572","volume":"55","author":"RNM Watson","year":"2012","unstructured":"Watson, R.N.M., Anderson, J., Laurie, B., Kennaway, K.: A taste of Capsicum: practical capabilities for UNIX. Commun. ACM 55(3), 97\u2013104 (2012)","journal-title":"Commun. ACM"},{"key":"17_CR21","unstructured":"Webb, S., Salcedo, B.: HardenedBSD Easy Feature Comparison (2019). https:\/\/hardenedbsd.org\/content\/easy-feature-comparison. Accessed 2019"},{"key":"17_CR22","unstructured":"Webb, S., Salcedo, B.: HardenedBSD Integriforce (2019). https:\/\/github.com\/HardenedBSD\/secadm. Accessed 2019. secadm 0.2"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42051-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T23:02:38Z","timestamp":1740006158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42051-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420505","9783030420512"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42051-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FINSEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security for Financial Critical Infrastructures and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"finsec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ds.unipi.gr\/cybericps2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}