{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T19:23:45Z","timestamp":1743881025689,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662831"},{"type":"electronic","value":"9783319662848"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66284-8_10","type":"book-chapter","created":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T08:14:30Z","timestamp":1504340070000},"page":"103-113","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions"],"prefix":"10.1007","author":[{"given":"Loui","family":"Al Sardy","sequence":"first","affiliation":[]},{"given":"Tong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Spisl\u00e4nder","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Saglietti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-08509-8_3","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Andriesse","year":"2014","unstructured":"Andriesse, D., Bos, H.: Instruction-level steganography for covert trigger-based malware. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 41\u201350. Springer, Cham (2014). doi: 10.1007\/978-3-319-08509-8_3"},{"key":"10_CR2","unstructured":"CAPEC (Common Attack Pattern Enumeration and Classification) Community: Overflow Buffers (CAPEC-100) (2017). http:\/\/capec.mitre.org\/data\/definitions\/100.html"},{"key":"10_CR3","unstructured":"Cowan, C., Barringer, M., Beattie, S., Kroah-Hartman, G., Frantzen, M., Lokier, J.: FormatGuard: automatic protection from printf format string vulnerabilities. In: Proceedings of 10th USENIX Security Symposium (SSYM 2001), vol. 10. USENIX Association (2001)"},{"key":"10_CR4","unstructured":"Intel\u00ae 64 and IA-32 Architectures: Software Developer\u2019s Manual, vol. 2. Instruction Set Reference (2016)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"J\u00e4mthagen, C., Lantz, P., Hell, M.: A new instruction overlapping technique for anti-disassembly and obfuscation of x86 binaries. In: Proceedings of Anti-malware Testing Research (WATeR 2014). IEEE Xplore (2014)","DOI":"10.1109\/WATeR.2013.6707878"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-319-45477-1_19","volume-title":"Computer Safety, Reliability, and Security","author":"C J\u00e4mthagen","year":"2016","unstructured":"J\u00e4mthagen, C., Lantz, P., Hell, M.: Exploiting trust in deterministic builds. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 238\u2013249. Springer, Cham (2016). doi: 10.1007\/978-3-319-45477-1_19"},{"key":"10_CR7","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-23802-9_23","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"F Kilic","year":"2015","unstructured":"Kilic, F., Kittel, T., Eckert, C.: Blind format string attacks. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICSSITE, vol. 153, pp. 301\u2013314. Springer, Cham (2015). doi: 10.1007\/978-3-319-23802-9_23"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Lhee, K., Chapin, S.: Buffer overflow and format string overflow vulnerabilities. J. Softw: Pract. Experience 33, 423\u2013460. Wiley (2003)","DOI":"10.1002\/spe.515"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/11875567_32","volume-title":"Computer Safety, Reliability, and Security","author":"N Oster","year":"2006","unstructured":"Oster, N., Saglietti, F.: Automatic test data generation by multi-objective optimisation. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 426\u2013438. Springer, Heidelberg (2006). doi: 10.1007\/11875567_32"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Paleari, R., Martignoni, L. Fresi Roglia, G., Bruschi, D.: N-version disassembly: differential testing of x86 disassemblers. In: Procedings of 19th International Symposium on Software Testing and Analysis. ACM (2010)","DOI":"10.1145\/1831708.1831741"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Saglietti, F., Lill, R.: A testing pattern for automatic control software addressing different degrees of process autonomy and cooperation. In: Proceedings of 19th World Congress of the International Federation of Automatic Control (IFAC), vol. 47. Elsevier (2014)","DOI":"10.3182\/20140824-6-ZA-1003.01997"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-319-45480-1_18","volume-title":"Computer Safety, Reliability, and Security","author":"F Saglietti","year":"2016","unstructured":"Saglietti, F., Meitner, M., Wardenburg, L., Richthammer, V.: Analysis of informed attacks and appropriate countermeasures for cyber-physical systems. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 222\u2013233. Springer, Cham (2016). doi: 10.1007\/978-3-319-45480-1_18"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007). ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"10_CR14","unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A first step towards automated detection of buffer overrun vulnerabilities. In: Proceedings of Network and Distributed System Security Symposium (NDSS 2000). The Internet Society (2000)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66284-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T22:49:04Z","timestamp":1570056544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66284-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662831","9783319662848"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66284-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}