{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:28:33Z","timestamp":1763479713028,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_8","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:36Z","timestamp":1238059596000},"page":"91-100","source":"Crossref","is-referenced-by-count":10,"title":["Report: Measuring the Attack Surfaces of Enterprise Software"],"prefix":"10.1007","author":[{"given":"Pratyusa K.","family":"Manadhata","sequence":"first","affiliation":[]},{"given":"Yuecel","family":"Karabulut","sequence":"additional","affiliation":[]},{"given":"Jeannette M.","family":"Wing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Howard, M.: Fending off future attacks by reducing attack surface (2003), \n                    \n                      http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/dncode\/html\/secure02132003.asp"},{"key":"8_CR2","unstructured":"Howard, M., Pincus, J., Wing, J.M.: Measuring relative attack surfaces. In: Proc. of Workshop on Advanced Developments in Software and Systems Security (2003)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Kaynar, D.K., Wing, J.M.: A formal model for a system\u2019s attack surface. Technical Report CMU-CS-07-144, CMU (July 2007)","DOI":"10.21236\/ADA477014"},{"key":"8_CR4","unstructured":"Ag, S.: NetWeaver, \n                    \n                      http:\/\/www.sap.com\/platform\/netweaver\/index.epx"},{"key":"8_CR5","unstructured":"Eclipse: Eclipse - An open development platform, \n                    \n                      http:\/\/www.eclipse.org\/"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Sharp, M., Sawin, J., Rountev, A.: Building a whole-program type analysis in Eclipse. In: Eclipse Technology Exchange Workshop at OOPSLA, pp. 6\u201310 (2005)","DOI":"10.1145\/1117696.1117698"},{"key":"8_CR7","unstructured":"Eclipse: Eclipse package org.eclipse.jdt.internal.corext.callhierarchy, \n                    \n                      http:\/\/mobius.inria.fr\/eclipse-doc\/org\/eclipse\/jdt\/internal\/corext\/callhierarchy\/package-summary.html"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Tan, K.M., Maxion, R.A., Wing, J.M.: An approach to measuring a system\u2019s attack surface. Technical Report CMU-CS-07-146, CMU (2007)","DOI":"10.21236\/ADA476977"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:07:25Z","timestamp":1580306845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}