{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:46Z","timestamp":1725536026753},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_1","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Software Security \u2013 The Dangers of Abstraction"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gollmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ashcraft, K., Engler, D.: Using programmer-written compiler extensions to catch security holes. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 143\u2013159 (2002)","DOI":"10.1109\/SECPRI.2002.1004368"},{"issue":"2","key":"1_CR2","first-page":"131","volume":"9","author":"M. Bishop","year":"1996","unstructured":"Bishop, M., Dilger, M.M.: Checking for race conditions in file accesses. Computing Systems\u00a09(2), 131\u2013152 (1996)","journal-title":"Computing Systems"},{"key":"1_CR3","unstructured":"Borisov, N., Johnson, R., Sastry, N., Wagner, D.: Fixing races for fun and profit: How to abuse atime. In: 14th USENIX Security Symposium, pp. 164\u2013173 (2005)"},{"key":"1_CR4","first-page":"235","volume-title":"9th ACM Conference on Computer and Communications Security","author":"H. Chen","year":"2002","unstructured":"Chen, H., Wagner, D.: MOPS: an infrastructure for examining security properties. In: 9th ACM Conference on Computer and Communications Security, pp. 235\u2013244. Springer, Heidelberg (2002)"},{"issue":"9","key":"1_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/114669.114686","volume":"34","author":"F.J. Corbato","year":"1991","unstructured":"Corbato, F.J.: On building systems that will fail. Communications of the ACM\u00a034(9), 72\u201381 (1991)","journal-title":"Communications of the ACM"},{"key":"1_CR6","unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proceedings of the 7th USENIX Security Symposium, pp. 63\u201378 (1998)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Eichin, M.W., Rochlis, J.A.: With microscope and tweezers: An analysis of the Internet virus of November 1988. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 326\u2013343 (1989)","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"1_CR8","volume-title":"Buffer Overflow Attacks","author":"J.C. Foster","year":"2005","unstructured":"Foster, J.C.: Buffer Overflow Attacks. Syngress Publishing, Rockland (2005)"},{"key":"1_CR9","volume-title":"Computer Security","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Computer Security, 2nd edn. John Wiley & Sons, Chichester (2006)","edition":"2"},{"key":"1_CR10","volume-title":"Secure Coding","author":"M.G. Graff","year":"2003","unstructured":"Graff, M.G., van Wyk, K.R.: Secure Coding. O\u2019Reilly & Associates, Sebastopol (2003)"},{"key":"1_CR11","volume-title":"Writing Secure Code","author":"M. Howard","year":"2002","unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code, 2nd edn. Microsoft Press, Redmond (2002)","edition":"2"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-540-39881-3_21","volume-title":"Security in Pervasive Computing","author":"R.B. Lee","year":"2004","unstructured":"Lee, R.B., Karig, D.K., McGregor, J.P., Shi, Z.: Enlisting hardware architecture to thwart malicious code injection. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 237\u2013252. Springer, Heidelberg (2004)"},{"issue":"1-2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10207-004-0068-2","volume":"4","author":"K.-s. Lhee","year":"2005","unstructured":"Lhee, K.-s., Chapin, S.J.: Detection of file-based race conditions. International Journal of Information Security\u00a04(1-2), 105\u2013119 (2005)","journal-title":"International Journal of Information Security"},{"key":"1_CR15","unstructured":"Aleph One: Smashing the stack for fun and profit. Phrack Magazine\u00a049 (1996)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Uppuluri, P., Joshi, U., Ray, A.: Preventing race condition attacks on filesystem. In: SAC 2005 (2005) (invited talk)","DOI":"10.1145\/1066677.1066758"},{"key":"1_CR17","volume-title":"Building Secure Software","author":"J. Viega","year":"2001","unstructured":"Viega, J., McGraw, G.: Building Secure Software. Addison-Wesley, Boston (2001)"},{"key":"1_CR18","unstructured":"Xu, J., Kalbarczyk, Z., Patel, S., Iyer, R.K.: Architecture support for defending against buffer overflow attacks. In: Proceedings of the EASY-2 Workshop (2002)"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:52:35Z","timestamp":1558446755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}