{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:53:00Z","timestamp":1725511980715},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540799658"},{"type":"electronic","value":"9783540799665"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-79966-5_3","type":"book-chapter","created":{"date-parts":[[2008,5,6]],"date-time":"2008-05-06T03:43:43Z","timestamp":1210045423000},"page":"36-48","source":"Crossref","is-referenced-by-count":0,"title":["Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Judge","sequence":"first","affiliation":[]},{"given":"Paul","family":"Williams","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Mullins","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Carrier, B.D., Grand, J.: A hardware-based memory acquisition procedure for digital investigations. Digital Investigation\u00a01 (2004)","key":"3_CR1","DOI":"10.1016\/j.diin.2003.12.001"},{"doi-asserted-by":"crossref","unstructured":"\u00d6zdoganoglu, H., Vijaykumar, T.N., Brodley, C.E., Kuperman, B.A., Jalote, A.: Smashguard: A hardware solution to prevent security attacks on the function return address. IEEE Transactions on Computers\u00a055 (2006)","key":"3_CR2","DOI":"10.1109\/TC.2006.166"},{"doi-asserted-by":"crossref","unstructured":"Gordon-Ross, A., Vahid, F.: Frequent loop detection using efficient non-intrusive on-chip hardware. In: CASES 2003: Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems (2003)","key":"3_CR3","DOI":"10.1145\/951710.951728"},{"doi-asserted-by":"crossref","unstructured":"Molina, J., Arbaugh, W.: Using independent auditors as instrusion detection systems. In: Information and Communications Security: 4th International Conference (December 2003)","key":"3_CR4","DOI":"10.1007\/3-540-36159-6_25"},{"unstructured":"Mott, S.: Exploring hardware-based primitives to enhance parallel security monitoring in a novel computing architecture. Master\u2019s thesis, Air Force Institute of Technology (March 2007)","key":"3_CR5"},{"unstructured":"Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot-a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179\u2013194 (2004)","key":"3_CR6"},{"doi-asserted-by":"crossref","unstructured":"Williams, P.D., Spafford, E.H.: Cupids: An exploration of highly focused, co-processor-based information system protection. Computer Networks,\u00a051 (April 2007)","key":"3_CR7","DOI":"10.1016\/j.comnet.2006.09.011"},{"doi-asserted-by":"crossref","unstructured":"Song, H., Lockwood, J.W.: Efficient packet classification for network intrusion detection using FPGA. In: FPGA 2005: Proceedings of the 2005 ACM\/SIGDA 13th international symposium on Field-programmable gate arrays (2005)","key":"3_CR8","DOI":"10.1145\/1046192.1046223"},{"doi-asserted-by":"crossref","unstructured":"Yi, S., koo Kim, B., Oh, J., Jang, J., Kesidis, G., Das, C.R.: Memory-efficient content filtering hardware for high-speed intrusion detection systems. In: SAC 2007: Proceedings of the 2007 ACM symposium on Applied computing (2007)","key":"3_CR9","DOI":"10.1145\/1244002.1244068"},{"doi-asserted-by":"crossref","unstructured":"Gonzalez, J.M., Paxson, V., Weaver, N.: Shunting: a hardware\/software architecture for flexible, high-performance network intrusion prevention. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security (2007)","key":"3_CR10","DOI":"10.1145\/1315245.1315264"},{"doi-asserted-by":"crossref","unstructured":"Hutchings, B.L., Franklin, R., Carver, D.: Assisting network intrusion detection with reconfigurable hardware. In: FCCM 2002: 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, vol.\u00a000 (2002)","key":"3_CR11","DOI":"10.1109\/FPGA.2002.1106666"},{"unstructured":"Hart, S.: APHID: Anomoly processor in hardware for intrusion detection. Master\u2019s thesis, Air Force Institute of Technology (March 2007)","key":"3_CR12"},{"key":"3_CR13","volume-title":"Proceedings - 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004","author":"L. Bu","year":"2004","unstructured":"Bu, L., Chandy, J.A.: FPGA based network intrusion detection using content addressable memories. In: Proceedings - 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004, CA 90720-1314, United States, April 2004, IEEE Computer Society, Los Alamitos (2004)"},{"doi-asserted-by":"crossref","unstructured":"Bazaz, A., Arthur, J.D.: Towards a taxonomy of vulnerabilities. In: Hawaii International Conference on System Sciences (2007)","key":"3_CR14","DOI":"10.1109\/HICSS.2007.566"},{"unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical report, Chalmers University of Technology (March 2000)","key":"3_CR15"},{"unstructured":"Williams, P.D.: CuPIDS: Increasing Information System Security Through The Use of Dedicated Co-Processing. PhD thesis, Purdue University (August 2005)","key":"3_CR16"},{"unstructured":"Kuperman, B.A.: A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources. PhD thesis, Purdue University (2004)","key":"3_CR17"},{"unstructured":"Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Technical Report 06-05, Department of Computer Science, Iowa State University (2006)","key":"3_CR18"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-540-39881-3_21","volume-title":"Security in Pervasive Computing","author":"R.B. Lee","year":"2004","unstructured":"Lee, R.B., Karig, D.K., McGreggor, J.P., Shi, Z.: Enlisting hardware architecture to thwart malicious code injection. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 237\u2013252. Springer, Heidelberg (2004)"},{"unstructured":"Rutkowska, J.: Beyond the CPU: Defeating hardware based RAM acquisition (February 2007), http:\/\/invisiblethings.org\/papers.html","key":"3_CR20"},{"unstructured":"Rootkit, F.U.: http:\/\/www.rootkit.com\/project.php?id=12","key":"3_CR21"},{"doi-asserted-by":"crossref","unstructured":"Levine, J., Grizzard, J.O.H.: A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table. In: Information Assurance Workshop, 2004. Proceedings. Second IEEE International, April 2004, pp. 107\u2013125 (2004)","key":"3_CR22","DOI":"10.1109\/IWIA.2004.1288042"},{"doi-asserted-by":"crossref","unstructured":"Tummala, A.K., Patel, P.: Distributed ids using reconfigurable hardware. In: 21st International Parallel and Distributed Processing Symposium, IPDPS 2007. Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States (March 2007)","key":"3_CR23","DOI":"10.1109\/IPDPS.2007.370616"},{"doi-asserted-by":"crossref","unstructured":"Mott, S., Hart, S., Montminy, D., Williams, P., Baldwin, R.: A hardware-based architecture to support flexible real-time parallel intrusion detection. In: Proc. 2007 IEEE International Conference on System of Systems Engineering (2007)","key":"3_CR24","DOI":"10.1109\/SYSOSE.2007.4304258"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79966-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T23:30:08Z","timestamp":1557531008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79966-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540799658","9783540799665"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79966-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}