{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:40:13Z","timestamp":1739292013387,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030949"},{"type":"electronic","value":"9783642030956"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03095-6_62","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T17:40:55Z","timestamp":1248975655000},"page":"661-672","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability"],"prefix":"10.1007","author":[{"given":"Tz-Rung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kwo-Cheng","family":"Chiu","sequence":"additional","affiliation":[]},{"given":"Da-Wei","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Dor, N., Rodeh, M., Sagiv, M.: Cssv: Towards a Realistic Tool for Statically Detecting all Buffer Overflows in C. In: ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, pp. 155\u2013167 (2003)","DOI":"10.1145\/781131.781149"},{"key":"62_CR2","unstructured":"Larochelle, D., Evans, D.: Statically Detecting Likely Buffer Overflow Vulnerabilities. In: 10th USENIX Security Symposium, pp. 177\u2013190 (2001)"},{"key":"62_CR3","unstructured":"Baratloo, A., Singh, N., Tsai, T.: Transparent Run-time Defense against Stack Smashing Attacks. In: USENIX Annual Technical Conference, pp. 251\u2013262 (2000)"},{"key":"62_CR4","unstructured":"Chiueh, T.C., Hsu, F.H.: RAD: A Compile-time Solution to Buffer Overflow Attacks. In: International Conference on Distributed Computing Systems, pp. 409\u2013417 (2001)"},{"key":"62_CR5","unstructured":"Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities. In: USENIX Security Symposium, pp. 91\u2013104 (2003)"},{"key":"62_CR6","unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: 7th USENIX Security Conference, pp. 63\u201378 (1998)"},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In: DARPA Information Survivability Conference and Exposition, pp. 119\u2013129 (2000)","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"62_CR8","unstructured":"Dik, C.: Non-Executable Stack for Solaris, Posted to comp.security.unix (January 1997)"},{"key":"62_CR9","unstructured":"Etoh, H., Yoda, K.: Protecting from Stack-Smashing Attacks, http:\/\/www.trl.ibm.com\/projects\/security\/ssp"},{"key":"62_CR10","unstructured":"The PaX Team: PaX Address Space Layout Randomization, http:\/\/pax.grsecurity.net"},{"key":"62_CR11","unstructured":"Ruwase, O., Lam, M.: A Practical Dynamic Buffer Overflow Detector. In: Network and Distributed System Buffer overflow Symposium, pp. 159\u2013169 (2004)"},{"key":"62_CR12","unstructured":"Solar Designer: Non-Executable User Stack, http:\/\/www.openwall.com\/linux\/"},{"key":"62_CR13","unstructured":"StackShield, http:\/\/www.angelfire.com\/sk\/stackshield"},{"key":"62_CR14","unstructured":"Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: 12th Annual Network and Distributed System Security Symposium (2005)"},{"key":"62_CR15","unstructured":"Rinard, M., Cadar, C., Dumitran, D., Roy, D., Leu, T., Beebee, J.W.: Enhancing Server Availability and Security Through Failure-Oblivious Computing. In: 6th Symposium on Operating Systems Design and Implementation, p. 21 (2004)"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Rinard, M., Cadar, C., Roy, D., Dumitran, D.: A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). In: 20th Annual Computer Security Applications Conference, pp. 82\u201390 (2004)","DOI":"10.1109\/CSAC.2004.2"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Sidiroglou, S., Keromytis, A.D.: A Network Worm Vaccine Architecture. In: 12th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 220\u2013225 (2003)","DOI":"10.1109\/ENABL.2003.1231411"},{"key":"62_CR18","doi-asserted-by":"crossref","unstructured":"Sidiroglou, S., Keromytis, A.D.: A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. In: 8th Information Security Conference, pp. 1\u201315 (2005)","DOI":"10.1007\/11556992_1"},{"key":"62_CR19","unstructured":"Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a Reactive Immune System for Software Services. In: USENIX Annual Technical Conference, pp. 149\u2013161 (2005)"},{"key":"62_CR20","unstructured":"Smirnov, A., Chiueh, T.C.: DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks. In: 12th Annual Network and Distributed System Security Symposium (2005)"},{"key":"62_CR21","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfa, B., Goh, E.J., Modadugu, N., Boneh, D.: On the Effectiveness of Address-Space Randomization. In: 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"62_CR22","unstructured":"Liang, Z., Sekar, R.: Automated, Sub-Second Attack Signature Generation: A Basis for Building Self-Protecting Servers. In: 12th ACM Conference on Computer and Communications Security (2005)"},{"key":"62_CR23","unstructured":"Liang, Z., Sekar, R.: Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. In: 21st Annual Computer Security Applications Conference, pp. 215\u2013224 (2005)"},{"key":"62_CR24","doi-asserted-by":"crossref","unstructured":"Dahn, C., Mancoridis, S.: Using Program Transformation to Secure C Programs against Buffer Overflows. In: 10th Working Conference on Reverse Engineering, pp. 323\u2013332 (2003)","DOI":"10.1109\/WCRE.2003.1287263"},{"key":"62_CR25","unstructured":"Perens, B.: Electric Fence, http:\/\/perens.com\/FreeSoftware\/ElectricFence"},{"issue":"13","key":"62_CR26","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/S0950-5849(02)00104-0","volume":"44","author":"J.R. Cordy","year":"2002","unstructured":"Cordy, J.R., Dean, T.R., Malton, A.J., Schneider, K.A.: Source Transformation in Software Engineering using the TXL Transformation System. Journal of Information and Software Technology\u00a044(13), 827\u2013837 (2002)","journal-title":"Journal of Information and Software Technology"},{"key":"62_CR27","unstructured":"Coker, R.: Postal Benchmark, http:\/\/www.coker.com.au\/postal"},{"key":"62_CR28","unstructured":"Mindcraft Inc.: WebStone: the Benchmark for Web Servers, http:\/\/www.mindcraft.com\/benchmarks\/webstone"},{"key":"62_CR29","unstructured":"Jim, T., Morrisett, G., Grossman, D., Hicks, M., Cheney, J., Wang, Y.: Cyclone: a Safe Dialect of C. In: USENIX Annual Technical Conference, pp. 275\u2013288 (2002)"},{"key":"62_CR30","doi-asserted-by":"crossref","unstructured":"Necula, G.C., McPeak, S., Weimer, W.: CCured: Type-Safe Retrofitting of Legacy Code. In: 29th ACM Symposium on Principles of Programming Languages, pp. 128\u2013139 (2002)","DOI":"10.1145\/503272.503286"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03095-6_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T15:45:27Z","timestamp":1739288727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03095-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030949","9783642030956"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03095-6_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}