{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:47:03Z","timestamp":1725925623682},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_44","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"707-726","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Formal Model for an Ideal CFI"],"prefix":"10.1007","author":[{"given":"Sepehr","family":"Minagar","sequence":"first","affiliation":[]},{"given":"Balasubramaniam","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Phu Dung","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"44_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-33338-5_5","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"V Veen van der","year":"2012","unstructured":"van der Veen, V., dutt-Sharma, N., Cavallaro, L., Bos, H.: Memory errors: the past, the present, and the future. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 86\u2013106. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33338-5_5"},{"key":"44_CR2","unstructured":"Bulba, K.: Bypassing StackGuard and StackShield, January 2000"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Roglia, G.F., Martignoni, L., Paleari, R., Bruschi, D.: Surgically returning to randomized lib (c). In: 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 60\u201369 (2009)","DOI":"10.1109\/ACSAC.2009.16"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp. 552\u2013561. ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"issue":"1","key":"44_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2133375.2133377","volume":"15","author":"R Roemer","year":"2012","unstructured":"Roemer, R., Buchanan, E., Shacham, H., Savage, S.: Return-oriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur. 15(1), 1\u201334 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 27\u201338 (2008)","DOI":"10.1145\/1455770.1455776"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 559\u2013572. ACM (2010)","DOI":"10.1145\/1866307.1866370"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 30\u201340 (2011)","DOI":"10.1145\/1966913.1966919"},{"key":"44_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","volume-title":"Information Systems Security","author":"P Chen","year":"2009","unstructured":"Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: DROP: detecting return-oriented programming malicious code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 163\u2013177. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10772-6_13"},{"key":"44_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-17714-9_11","volume-title":"Information Systems Security","author":"P Chen","year":"2010","unstructured":"Chen, P., Xing, X., Han, H., Mao, B., Xie, L.: Efficient detection of the return-oriented programming malicious code. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 140\u2013155. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17714-9_11"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Onarlioglu, K., Bilge, L., Lanzi, A., Balzarotti, D., Kirda, E.: G-free: defeating return-oriented programming through gadget-less binaries. In: Proceedings of the 26th Annual Computer Security Applications Conference, Austin, Texas, pp. 49\u201358. ACM (2010)","DOI":"10.1145\/1920261.1920269"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Z., Jiang, X., Grace, M., Bahram, S.: Defeating return-oriented rootkits with \u201creturn-less\u201d kernels. In: Proceedings of the 5th European conference on Computer systems, Paris, France, pp. 195\u2013208. ACM (2010)","DOI":"10.1145\/1755913.1755934"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: ROPdefender: a detection tool to defend against return-oriented programming attacks. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, pp. 40\u201351. ACM (2011)","DOI":"10.1145\/1966913.1966920"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Pappas, V., Polychronakis, M., Keromytis, A.: Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 601\u2013615 (2012)","DOI":"10.1109\/SP.2012.41"},{"key":"44_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-23644-0_7","volume-title":"Recent Advances in Intrusion Detection","author":"M Tran","year":"2011","unstructured":"Tran, M., Etheridge, M., Bletsch, T., Jiang, X., Freeh, V., Ning, P.: On the expressiveness of return-into-libc attacks. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 121\u2013141. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_7"},{"key":"44_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-23644-0_6","volume-title":"Recent Advances in Intrusion Detection","author":"K Lu","year":"2011","unstructured":"Lu, K., Zou, D., Wen, W., Gao, D.: Packed, printable, and polymorphic return-oriented programming. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 101\u2013120. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_6"},{"key":"44_CR18","unstructured":"Carlini, N., Wagner, D.: ROP is still dangerous: Breaking modern defenses. In: USENIX Security Symposium (2014)"},{"key":"44_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/11576280_9","volume-title":"Formal Methods and Software Engineering","author":"M Abadi","year":"2005","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: A theory of secure control flow. In: Lau, K.-K., Banach, R. (eds.) ICFEM 2005. LNCS, vol. 3785, pp. 111\u2013124. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11576280_9"},{"issue":"1","key":"44_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609960","volume":"13","author":"M Abadi","year":"2009","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1), 1\u201340 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Davi, L., Larsen, P.: Securing legacy software against real-world code-reuse exploits: utopia, alchemy, or possible future? In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, Republic of Singapore, pp. 55\u201361. ACM (2015)","DOI":"10.1145\/2714576.2737090"},{"key":"44_CR22","unstructured":"Carlini, N., Barresi, A., Payer, M., Wagner, D., Gross, T.R.: Control-flow bending: On the effectiveness of control-flow integrity. In: USENIX SEC (2015)"},{"issue":"1","key":"44_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3054924","volume":"50","author":"N Burow","year":"2017","unstructured":"Burow, N., Carr, S.A., Nash, J., Larsen, P., Franz, M., Brunthaler, S., Payer, M.: Control-flow integrity: precision, security, and performance. ACM Comput. Surv. 50(1), 1\u201333 (2017)","journal-title":"ACM Comput. Surv."},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Hamid, N., Shao, Z., Trifonov, V., Monnier, S., Ni, Z.: A syntactic approach to foundational proof-carrying code. In: 2002 Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science, pp. 89\u2013100 (2002)","DOI":"10.1109\/LICS.2002.1029819"},{"key":"44_CR25","unstructured":"van Benthem, J., van Ditmarsch, H., van Eijck, J., Jaspars, J.: Chapter 6: Logic and Action. In: Logic in Action, February 2014. Internet electronic book"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Harel, D., Kozen, D., Tiuryn, J.: Propositional Dynamic Logic, pp. 163\u2013190. MIT Press, Cambridge (2000)","DOI":"10.7551\/mitpress\/2516.001.0001"},{"key":"44_CR27","doi-asserted-by":"crossref","unstructured":"Jang, D., Tatlock, Z., Lerner, S.: SAFEDISPATCH: securing C++ virtual calls from memory corruption attacks. In: Symposium on Network and Distributed System Security (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23287"},{"key":"44_CR28","unstructured":"Tice, C., Roeder, T., Collingbourne, P., Checkoway, S., Erlingsson,, Lozano, L., Pike, G.: Enforcing forward-edge control-flow integrity in gcc & llvm. In: USENIX Security Symposium (2014)"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Gawlik, R., Holz, T.: Towards automated integrity protection of C++ virtual function tables in binary programs. In: Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pp. 396\u2013405. ACM (2014)","DOI":"10.1145\/2664243.2664249"},{"key":"44_CR30","doi-asserted-by":"crossref","unstructured":"Prakash, A., Hu, X., Yin, H.: vfGuard: Strict protection for virtual function calls in COTS C++ binaries. In: Symposium on Network and Distributed System Security (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23297"},{"key":"44_CR31","doi-asserted-by":"crossref","unstructured":"Yu, H., Xue, J., Huo, W., Feng, X., Zhang, Z.: Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code. In: Proceedings of the 8th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, Toronto, Ontario, Canada, pp. 218\u2013229. ACM (2010)","DOI":"10.1145\/1772954.1772985"},{"key":"44_CR32","unstructured":"MITRE: CVE - Download CVE"},{"issue":"6","key":"44_CR33","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1145\/2666356.2594295","volume":"49","author":"B Niu","year":"2014","unstructured":"Niu, B., Tan, G.: Modular control-flow integrity. SIGPLAN Not. 49(6), 577\u2013587 (2014)","journal-title":"SIGPLAN Not."},{"key":"44_CR34","unstructured":"Davi, L., Dmitrienko, A., Egele, M., Fischer, T., Holz, T., Hund, R., Nrnberger, S., Sadeghi, A.R.: MoCFI: A framework to mitigate control-flow attacks on smartphones. In: NDSS (2012)"},{"key":"44_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wei, T., Chen, Z., Duan, L., Szekeres, L., McCamant, S., Song, D., Zou, W.: Practical control flow integrity and randomization for binary executables. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 559\u2013573 (2013)","DOI":"10.1109\/SP.2013.44"},{"key":"44_CR36","doi-asserted-by":"crossref","unstructured":"Criswell, J., Dautenhahn, N., Adve, V.: KCoFI: complete control-flow integrity for commodity operating system kernels. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 292\u2013307 (2014)","DOI":"10.1109\/SP.2014.26"},{"key":"44_CR37","unstructured":"Zhang, M., Sekar, R.: Control flow integrity for COTS binaries. In: Usenix Security, pp. 337\u2013352 (2013)"},{"key":"44_CR38","unstructured":"Davi, L., Lehmann, D., Sadeghi, A.R., Monrose, F.: Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection. In: USENIX Security Symposium (2014)"},{"key":"44_CR39","doi-asserted-by":"crossref","unstructured":"Goktas, E., Athanasopoulos, E., Bos, H., Portokalidis, G.: Out of control: overcoming control-flow integrity. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 575\u2013589, May 2014","DOI":"10.1109\/SP.2014.43"},{"key":"44_CR40","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.: Mitigating code-reuse attacks with control-flow locking. In: Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, Florida, pp. 353\u2013362. ACM (2011)","DOI":"10.1145\/2076732.2076783"},{"key":"44_CR41","doi-asserted-by":"crossref","unstructured":"Niu, B., Tan, G.: Monitor integrity protection with space efficiency and separate compilation. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & communications security, Berlin, Germany, pp. 199\u2013210. ACM (2013)","DOI":"10.1145\/2508859.2516649"},{"key":"44_CR42","unstructured":"Pappas, V., Polychronakis, M., Keromytis, A.D.: Transparent ROP exploit mitigation using indirect branch tracing. In: USENIX Security, pp. 447\u2013462 (2013)"},{"key":"44_CR43","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Zhou, Z., Miao, Y., Ding, X., DENG, H.: ROPecker: A generic and practical approach for defending against ROP attack (2014)","DOI":"10.14722\/ndss.2014.23156"},{"key":"44_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-26362-5_4","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"P Yuan","year":"2015","unstructured":"Yuan, P., Zeng, Q., Ding, X.: Hardware-assisted fine-grained code-reuse attack detection. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 66\u201385. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_4"},{"key":"44_CR45","doi-asserted-by":"crossref","unstructured":"Mohan, V., Larsen, P., Brunthaler, S., Hamlen, K., Franz, M.: Opaque control-flow integrity. In: Symposium on Network and Distributed System Security (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23271"},{"key":"44_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, C., Song, C., Chen, K.Z., Chen, Z., Song, D.: VTint: defending virtual function tables integrity. In: Symposium on Network and Distributed System Security (NDSS) (2015)","DOI":"10.14722\/ndss.2015.23099"},{"key":"44_CR47","unstructured":"Erlingsson, U., Abadi, M., Vrable, M., Budiu, M., Necula, G.C.: XFI: Software guards for system address spaces. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 75\u201388 (2006)"},{"key":"44_CR48","doi-asserted-by":"crossref","unstructured":"Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with WIT. In: 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 263\u2013277, May 2008","DOI":"10.1109\/SP.2008.30"},{"key":"44_CR49","doi-asserted-by":"crossref","unstructured":"Pewny, J., Holz, T.: Control-flow restrictor: compiler-based CFI for iOS. In: Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pp. 309\u2013318. ACM (2013)","DOI":"10.1145\/2523649.2523674"},{"key":"44_CR50","doi-asserted-by":"crossref","unstructured":"Davi, L., Hanreich, M., Paul, D., Sadeghi, A.R., Koeberl, P., Sullivan, D., Arias, O., Jin, Y.: HAFIX: hardware-assisted flow integrity extension. In: Proceedings of the 52nd Annual Design Automation Conference, San Francisco, California, pp. 1\u20136. ACM (2015)","DOI":"10.1145\/2744769.2744847"},{"key":"44_CR51","doi-asserted-by":"crossref","unstructured":"Bounov, D., Kc, R.G., Lerner, S.: Protecting C++ dynamic dispatch through vtable interleaving. In: Symposium on Network and Distributed System Security (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23421"},{"key":"44_CR52","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 380\u2013395 (2010)","DOI":"10.1109\/SP.2010.30"},{"key":"44_CR53","doi-asserted-by":"crossref","unstructured":"Niu, B., Tan, G.: RockJIT: Securing just-in-time compilation using modular control-flow integrity. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA, pp. 1317\u20131328. ACM (2014)","DOI":"10.1145\/2660267.2660281"},{"key":"44_CR54","doi-asserted-by":"crossref","unstructured":"Mashtizadeh, A.J., Bittau, A., Boneh, D., Mazi\u00e8res, D.: CCFI: cryptographically enforced control flow integrity. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, pp. 941\u2013951. ACM (2015)","DOI":"10.1145\/2810103.2813676"},{"key":"44_CR55","doi-asserted-by":"crossref","unstructured":"Ge, X., Talele, N., Payer, M., Jaeger, T.: Fine-grained control-flow integrity for kernel software. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 179\u2013194, March 2016","DOI":"10.1109\/EuroSP.2016.24"},{"key":"44_CR56","doi-asserted-by":"crossref","unstructured":"van der Veen, V., Andriesse, D., Goktas; E., Gras, B., Sambuc, L., Slowinska, A., Bos, H., Giuffrida, C.: Practical context-sensitive CFI. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, pp. 927\u2013940. ACM (2015)","DOI":"10.1145\/2810103.2813673"},{"key":"44_CR57","doi-asserted-by":"crossref","unstructured":"Niu, B., Tan, G.: Per-input control-flow integrity. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, pp. 914\u2013926. ACM (2015)","DOI":"10.1145\/2810103.2813644"},{"key":"44_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-20550-2_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Payer","year":"2015","unstructured":"Payer, M., Barresi, A., Gross, T.R.: Fine-grained control-flow integrity through binary hardening. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 144\u2013164. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20550-2_8"},{"key":"44_CR59","doi-asserted-by":"crossref","unstructured":"Theodorides, M., Wagner, D.: Breaking active-set backward-edge CFI. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 85\u201389, May 2017","DOI":"10.1109\/HST.2017.7951803"},{"key":"44_CR60","doi-asserted-by":"crossref","unstructured":"Evans, I., Long, F., Otgonbaatar, U., Shrobe, H., Rinard, M., Okhravi, H., Sidiroglou-Douskos, S.: Control Jujutsu: on the weaknesses of fine-grained control flow integrity. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, pp. 901\u2013913. ACM (2015)","DOI":"10.1145\/2810103.2813646"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T13:17:56Z","timestamp":1570454276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}