{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:50:27Z","timestamp":1725511827779},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540718048"},{"type":"electronic","value":"9783540718055"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71805-5_2","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T13:01:18Z","timestamp":1182344478000},"page":"11-20","source":"Crossref","is-referenced-by-count":7,"title":["Evolving Buffer Overflow Attacks with Detector Feedback"],"prefix":"10.1007","author":[{"given":"H. Gunes","family":"Kayacik","sequence":"first","affiliation":[]},{"given":"Malcolm Iain","family":"Heywood","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host based intrusion detection systems, ACM Conference on Computer and Communications Security, pp. 255\u2013264 (2002)","key":"2_CR1","DOI":"10.1145\/586110.586145"},{"key":"2_CR2","first-page":"54","volume-title":"RAID 2002","author":"K.M.C. Tan","year":"2002","unstructured":"Tan, K.M.C., Killourhy, K.S., Maxion, R.A.: Undermining an Anomaly-based Intrusion Detection System using Common Exploits. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002, vol.\u00a02516, pp. 54\u201373. Springer, Berlin Heidelberg New York (2002)"},{"doi-asserted-by":"crossref","unstructured":"Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Automating mimicry attacks using static binary analysis, Proceedings of the USENIX Security Symposium, pp. 717\u2013738 (2005)","key":"2_CR3","DOI":"10.1016\/j.comnet.2005.01.009"},{"doi-asserted-by":"crossref","unstructured":"Tan, K.M.C.: McHugh, J., Killourhy, K.S.: Hiding Intrusions: From the Abnormal to the Normal and Beyond, Symposium on Information Hiding, pp. 1\u201317 (2002)","key":"2_CR4","DOI":"10.1007\/3-540-36415-3_1"},{"unstructured":"Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Evolving Successful Stack Overflow Attacks for Vulnerability Testing, 21st Annual Computer Security Applications Conference, pp. 225\u2013234 (2005)","key":"2_CR5"},{"key":"2_CR6","first-page":"1667","volume-title":"SIGEVO","author":"H.G. Kayacik","year":"2006","unstructured":"Kayacik, H.G., Heywood, M.I., Zincir-Heywood, A.N.: On Evolving Buffer Overflow Attacks using Genetic Programming. Proceedings of the Genetic and Evolutionary Computation Conference. In: SIGEVO, July 8-12, pp. 1667\u20131673. ACM Press, New York, NY, USA (2006)"},{"unstructured":"University of New Mexico, Computer Science Department, Computer Immune Systems Data Sets and Software http:\/\/www.cs.unm.edu\/immsec\/data-sets.htm (Last accessed May 2006)","key":"2_CR7"},{"unstructured":"Securiteam Web Site, Linux Traceroute Exploit Code Released (GDB), October 2002 http:\/\/www.securiteam.com\/exploits\/6A00A1F5QM.html (Last accessed May 2006)","key":"2_CR8"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutinary Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71805-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T08:41:06Z","timestamp":1683880866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71805-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540718048","9783540718055"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71805-5_2","relation":{},"subject":[]}}