{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:42:58Z","timestamp":1743025378748,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_11","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"100-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dancing with the Adversary: A Tale of Wimps and Giants"],"prefix":"10.1007","author":[{"given":"Virgil","family":"Gligor","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"11_CR1","unstructured":"Amoroso, E.G.: Fundamentals of Computer Security Technology, pp, 15\u201329. Prentice-Hall (1994) ISBN0131089293"},{"issue":"2","key":"11_CR2","first-page":"131","volume":"9","author":"M Bishop","year":"1996","unstructured":"Bishop, M., Dilger, M.: Checking for race conditions in file accesses. Comput. Syst. 9(2), 131\u2013152 (1996)","journal-title":"Comput. Syst."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of \u201cStealthy Takeover.\u201d J. Cryptology 26(4), 655\u2013713 (2013). (also in IACR Cryptology ePrint Archive, Report 2012\/103, 2012)","DOI":"10.1007\/s00145-012-9134-5"},{"issue":"6","key":"11_CR4","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/TSE.1979.230196","volume":"SE\u20135","author":"VD Gligor","year":"1979","unstructured":"Gligor, V.D., Lindsay, B.G.: Object migration and authentication. IEEE Trans. Softw. Eng. SE\u20135(6), 607\u2013611 (1979)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-77156-2_34","volume-title":"Security Protocols","author":"VD Gligor","year":"2007","unstructured":"Gligor, V.D.: On the evolution of adversary models in security protocols (or Know Your Friend and Foe Alike). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 276\u2013283. Springer, Heidelberg (2007)"},{"key":"11_CR6","unstructured":"Gligor, V.D.: Security limitations of virtualization and how to overcome them. In: Proceedings of the 18th International Workshop on Security Protocols (SPW-18). LNCS, Cambridge University, UK, vol. 7061. Springer, March 2010"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-25867-1_22","volume-title":"Security Protocols XIX","author":"V Gligor","year":"2011","unstructured":"Gligor, V., Wing, J.M.: Towards a theory of trust in networks of humans and computers (transcript of discussion). In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 223\u2013242. Springer, Heidelberg (2011)"},{"key":"11_CR8","unstructured":"Gupta, S., Gligor, V.D.: Experience with a penetration analysis method and tool. In: Proceedings of the 1992 National Computer Security Conference, Baltimore, Maryland, pp. 165\u2013183 (1992)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/0-387-24006-3_8","volume-title":"Computer Security in the 21st Century, chap. 8","author":"M Howard","year":"2005","unstructured":"Howard, M., Pincus, J., Wing, J.M.: Measuring relative attack surfaces. In: Lee, D.T., Shieh, S.P., Tygar, J.D. (eds.) Computer Security in the 21st Century, chap. 8, pp. 109\u2013137. Springer, New York (2005)"},{"key":"11_CR10","unstructured":"Hutchins, E.M., Clopper, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion Kill Chains. In: Proceedings of the 6th Annual International Conference on Information Warfare and Security, Washington, DC (2011)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-35694-0_12","volume-title":"Security Protocols XX","author":"TH-J Kim","year":"2012","unstructured":"Kim, T.H.-J., Gligor, V., Perrig, A.: Street-level trust semantics for attribute authentication (transcript of discussion). In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2012. LNCS, vol. 7622, pp. 96\u2013115. Springer, Heidelberg (2012)"},{"key":"11_CR12","first-page":"137","volume-title":"In: Computer Systems: Theory, Technology, and Applications","author":"BW Lampson","year":"2004","unstructured":"Lampson, B.W.: Software components: Only the giants survive. In: Computer Systems: Theory, Technology, and Applications, pp. 137\u2013145. Springer, New York (2004)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1592761.1592773","volume":"52","author":"BW Lampson","year":"2009","unstructured":"Lampson, B.W.: Usable security: how to get it. Commun. ACM 52, 25\u201327 (2009)","journal-title":"Commun. ACM"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Li, Y., McCune, J., Perrig, A.: VIPER: verifying the integrity of peripherals firmware. In: Proceedings of the ACM Conference on Computer and Communications Security (2011)","DOI":"10.1145\/2046707.2046711"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-00199-4_8","volume-title":"Engineering Secure Software and Systems","author":"PK Manadhata","year":"2009","unstructured":"Manadhata, P.K., Karabulut, Y., Wing, J.M.: Report: measuring the attack surfaces of enterprise software. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 91\u2013100. Springer, Heidelberg (2009)"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"McCune, J., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: efficient TCB reduction and attestation. In: CMU-CyLab-09-003, March, 2009. (also in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2010)","DOI":"10.1109\/SP.2010.17"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Parno, B., McCune, J.M., Perrig, A.: Bootstrapping trust in commodity computers. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2010","DOI":"10.1109\/SP.2010.32"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-540-30502-6_2","volume-title":"Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: On the role definitions in and beyond cryptography. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 13\u201332. Springer, Heidelberg (2004)"},{"key":"11_CR20","unstructured":"Rushby, J.M.: Separation and Integration in MILS (The MILS Constitution). Technical report, SRI-CSL-TR-08-XX, Feb 2008"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Parno, B., Lorch, J., Douceur, J., Mickens, J., McCune, J.: Memoir: practical state continuity for protected modules. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.38"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Vasudevan, A., Chaki, S., Jia, L., McCune, L.J., Newsome, J., Datta, A.: Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. In: Proceedings of the IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.36"},{"key":"11_CR23","unstructured":"Vasudevan, A., Parno, B., Qu, N., Gligor, V., Perrig, A.: Lockdown: a safe and practical environment for security applications. In: CMU-CyLab-09-011, 14 July 2009. (Also in Proceedings of TRUST, Vienna, Austria, 2012)"},{"issue":"12","key":"11_CR24","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"key":"11_CR25","unstructured":"Weiss, J.D.: A system security engineering process. In: Proceedings of the 14th National Computer Security Conference, Baltimore, Maryland (1991)"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-41717-7_12","volume-title":"Security Protocols XXI","author":"J Zhao","year":"2013","unstructured":"Zhao, J., Gligor, V., Perrig, A., Newsome, J.: ReDABLS: revisiting device attestation with bounded leakage of secrets. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 94\u2013114. Springer, Heidelberg (2013)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Gligor, V., Newsome, J., McCune, J.: Building verifiable trusted path on commodity x86 computers. In: Proceedings of the IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.42"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38908-5_1","volume-title":"Trust and Trustworthy Computing","author":"Z Zhou","year":"2013","unstructured":"Zhou, Z., Han, J., Lin, Y.-H., Perrig, A., Gligor, V.: KISS: \u201ckey it simple and secure\u201d corporate key management. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 1\u201318. Springer, Heidelberg (2013)"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Miao, Y.: Dancing with giants: wimpy kernels for on-demand isolated I\/O on commodity platforms. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA (2014)","DOI":"10.1109\/SP.2014.27"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:37:56Z","timestamp":1676417876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}