{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:10:29Z","timestamp":1738368629809,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858843"},{"type":"electronic","value":"9783540858867"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85886-7_8","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T12:45:42Z","timestamp":1221655542000},"page":"114-130","source":"Crossref","is-referenced-by-count":2,"title":["Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Iwahashi","sequence":"first","affiliation":[]},{"given":"Daniela A. S.","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jedidiah R.","family":"Crandall","sequence":"additional","affiliation":[]},{"given":"Young-Jun","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Jin-Tae","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Jong-Soo","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Biba, K.J.: Integrity Considerations for Secure Computer Systems. In: MITRE Technical Report TR-3153 (April 1977)","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bishop, M.: Computer Security: Art and Science (2003)","key":"8_CR2","DOI":"10.1016\/S1361-3723(03)00208-2"},{"doi-asserted-by":"crossref","unstructured":"Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards Automatic Generation of Vulnerability-Based Signatures. In: IEEE Symposium on Security and Privacy (May 2006)","key":"8_CR3","DOI":"10.1109\/SP.2006.41"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1095810.1095824","volume-title":"SOSP 2005: Proceedings of the twentieth ACM Symposium on Operating Systems Principles","author":"M. Costa","year":"2005","unstructured":"Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-end containment of Internet worms. In: SOSP 2005: Proceedings of the twentieth ACM Symposium on Operating Systems Principles, pp. 133\u2013147. ACM Press, New York (2005)"},{"doi-asserted-by":"crossref","unstructured":"Crandall, J.R., Chong, F.T.: Minos: Control Data Attack Prevention Orthogonal to Memory Model. MICRO, 221\u2013232 (December 2004)","key":"8_CR5","DOI":"10.1109\/MICRO.2004.26"},{"doi-asserted-by":"crossref","unstructured":"Crandall, J.R., Su, Z., Wu, S.F., Chong, F.T.: On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits. ACM CCS, 235\u2013248 (November 2005)","key":"8_CR6","DOI":"10.1145\/1102120.1102152"},{"unstructured":"Eclipse, S.: kill-bill windows exploit, http:\/\/www.phreedom.org\/solar\/exploits\/msasn1-bitstring\/kill-bill.tar.gz","key":"8_CR7"},{"issue":"7","key":"8_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM\u00a019(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure Execution Via Program Shepherding. In: USENIX, pp. 191\u2013206 (2002)","key":"8_CR9"},{"unstructured":"Larmouth, J.: Asn.1 complete. open system solutions (1999)","key":"8_CR10"},{"doi-asserted-by":"crossref","unstructured":"Murata, T.: Petri Nets: Properties, Analysis, and Applications. Proceedings of the IEEE\u00a077(4) (April 1989)","key":"8_CR11","DOI":"10.1109\/5.24143"},{"doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 226\u2013241 (2005)","key":"8_CR12","DOI":"10.1109\/SP.2005.15"},{"unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS 2005) (Febuary 2005)","key":"8_CR13"},{"doi-asserted-by":"crossref","unstructured":"Polychronakis, M., Anagnostakis, K., Markatos, E.: Network-level polymorphic shellcode detection using emulation. Institute for infocomm research, singapore (2005)","key":"8_CR14","DOI":"10.1007\/11790754_4"},{"doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H.-S., Zhou, Y., Wu, Y.: LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. MICRO-39, 135\u2013148 (December 2006)","key":"8_CR15","DOI":"10.1109\/MICRO.2006.29"},{"unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: OSDI (2004)","key":"8_CR16"},{"unstructured":"Szor, P.: The Art of Computer Virus Research and Defense (2005)","key":"8_CR17"},{"unstructured":"Tang, Y., Chen, S.: Defending Against Internet Worms: A Signature-based Approach. In: INFOCOM (2005)","key":"8_CR18"},{"doi-asserted-by":"crossref","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I.: Rifle: An architectural framework for user-centric information-flow security. In: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004, pp. 39\u201358 (2004)","key":"8_CR19","DOI":"10.1109\/MICRO.2004.31"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-25978-7_21","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 201\u2013222. Springer, Heidelberg (2004)"},{"unstructured":"Wikipedia. Wikipedia. Petri net, http:\/\/en.wikipedia.org\/wiki\/Main_Page","key":"8_CR21"},{"unstructured":"eEye advisory for AD20040210-2, http:\/\/www.eeye.com","key":"8_CR22"},{"unstructured":"SNORT: The open source network intrusion detection system (2002), http:\/\/www.snort.org","key":"8_CR23"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85886-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T23:36:32Z","timestamp":1738366592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85886-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858843","9783540858867"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85886-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}