{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:01Z","timestamp":1763468221390,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_32","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"321-331","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Stack Based Kernel Information Leaks"],"prefix":"10.1007","author":[{"given":"S.","family":"Peir\u00f3","sequence":"first","affiliation":[]},{"given":"M.","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]},{"given":"M.","family":"Masmano","sequence":"additional","affiliation":[]},{"given":"A.","family":"Crespo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"CVE-2010-4525. kvm: x86: zero kvm_vcpu_events-> interrupt.pad infoleak"},{"key":"32_CR2","unstructured":"CVE-2012-0053: Apache information disclosure on response to Bad HTTP Request"},{"key":"32_CR3","unstructured":"CVE-2013-2147. fix info leak in cciss_ioctl32_passthru(), \n                    https:\/\/git.kernel.org"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Chen, H., Mao, Y., Wang, X.: Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In: APSYS 2011. ACM (2011)","DOI":"10.1145\/2103799.2103805"},{"key":"32_CR5","unstructured":"MITRE. Common Weakness\u00a0Enumeration. CWE-200: Information Exposure"},{"key":"32_CR6","unstructured":"Intel Corp. IA-32 Architecture Software Developer\u2019s Manual - Volume 3A (2007)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Herrero, A., et al.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. In: FGCS 2013 (2013)","DOI":"10.1016\/j.future.2010.12.017"},{"key":"32_CR8","unstructured":"Cowan, C., et al.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: USENIX-SEC (1998)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Denning, D.E., et al.: Certification of Programs for Secure Information Flow. In: C. ACM (1977)","DOI":"10.1145\/359636.359712"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Hund, R., et al.: Practical Timing Side Channel Attacks Against Kernel Space ASLR. In: IEEE SSP (2013)","DOI":"10.1109\/SP.2013.23"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Strackx, R., et al.: Breaking the Memory Secrecy Assumption. In: EUROSEC 2009 (2009)","DOI":"10.1145\/1519144.1519145"},{"key":"32_CR12","unstructured":"Gorman, M.: Understanding the Linux virtual memory manager. Prentice Hall"},{"key":"32_CR13","unstructured":"Hopcroft, J.E.: Introduction to Automata Theory, Languages, and Computation (2008)"},{"key":"32_CR14","unstructured":"ISO. The ANSI C standard (C99). Technical Report WG14 N1124, ISO\/IEC (1999)"},{"key":"32_CR15","unstructured":"Johnson, R.: Finding user\/kernel pointer bugs with type inference. In: USENIX-SEC"},{"key":"32_CR16","unstructured":"Jones, D.: The Trinity system call fuzzer. Linux Kernel (2013)"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Lawall, J.L., Brunel, J., Palix, N., Rydhof Hansen, R.: WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. In: DSN 2009. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270354"},{"key":"32_CR18","unstructured":"Linux. kptr_restrict: disclosure of kernel pointers, \n                    http:\/\/git.kernel.org\/cgit\/linux\/kernel\/git\/stable\/linux-stable.git\/tree\/Documentation\/sysctl\/kernel.txt"},{"key":"32_CR19","unstructured":"Peir\u00f3, S.: CVE request: Assorted kernel infoleak security fixes. CVE-2014-1444"},{"key":"32_CR20","unstructured":"Rosenberg, D., Oberheide, J.: Stackjacking: A PaX exploit framework (2011)"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Saltzer, J.: The protection of information in computer systems. In: IEEE Proc. (1975)","DOI":"10.1109\/PROC.1975.9939"},{"key":"32_CR22","unstructured":"S\u00e1nchez, J., Peir\u00f3, S., Masmano, M., Sim\u00f3, J., Balbastre, P.: Linux porting to the XtratuM Hypervisor for x86 processors. In: 14th Real Time Linux Workshop (2012)"},{"key":"32_CR23","unstructured":"Stuart, H.: Hunting Bugs with Coccinelle. PhD thesis, Diku (2008)"},{"key":"32_CR24","unstructured":"Tanenbaum, A.S.: Modern Operating Systems, 3rd edn. Prentice Hall (2007)"},{"key":"32_CR25","unstructured":"PAX Team. Address Space Layout Randomization (ASLR) (2001)"},{"key":"32_CR26","unstructured":"Torvalds, L.: Sparse: A semantic parser for C (2006), \n                    http:\/\/sparse.wiki.kernel.org"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:12:40Z","timestamp":1710843160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}