{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:42Z","timestamp":1725899982367},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_15","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"228-245","source":"Crossref","is-referenced-by-count":0,"title":["SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Bratus","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brian","family":"Schulte","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Bratus, S., D\u2019Cunha, N., Sparks, E., Smith, S.: TOCTOU, Traps, and Trusted Computing. In: Proceedings of the TRUST 2008 Conference, Villach, Austria (March 2008)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-8348-9324-6_3","volume-title":"Future of Trust in Computing","author":"S. Bratus","year":"2009","unstructured":"Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: New Directions for Hardware-assisted Trusted Computing Policies (Position Paper). In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, p. 30. Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden (2009), ISBN 978-3-8348-0794-6"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1456482.1456491","volume-title":"VMSec 2008: Proceedings of the 1st ACM workshop on Virtual machine security","author":"S. Bratus","year":"2008","unstructured":"Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. In: VMSec 2008: Proceedings of the 1st ACM workshop on Virtual machine security, pp. 49\u201358. ACM, New York (2008)"},{"key":"15_CR4","unstructured":"Levine, J.: Linkers & Loaders. Morgan Kaufmann\/Academic (2000)"},{"key":"15_CR5","unstructured":"Last Stage of Delirium Research Group: Kernel Level Vulnerabilities: Behind the Scenes of the 5th Argus Hacking Challenge. Black Hat Briefings, Amsterdam (November 2001), http:\/\/www.blackhat.com\/presentations\/bh-europe-01\/LSD\/bh-europe-01-lsd.ppt"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2004.46","volume":"2","author":"I. Arce","year":"2004","unstructured":"Arce, I.: The kernel craze. IEEE Security and Privacy\u00a02, 79\u201381 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"15_CR7","unstructured":"Kauer, B.: Private Communication"},{"key":"15_CR8","unstructured":"Banerji, A., Tracey, J.M., Cohn, D.L.: Protected shared libraries: a new approach to modularity and sharing. In: ATEC 1997: Proceedings of the Annual Conference on USENIX Annual Technical Conference, Berkeley, CA, USA, p. 5. USENIX Association (1997)"},{"issue":"5","key":"15_CR9","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1145\/319344.319161","volume":"33","author":"T.C. Chiueh","year":"1999","unstructured":"Chiueh, T.C., Venkitachalam, G., Pradhan, P.: Integrating segmentation and paging protection for safe, efficient and transparent software extensions. SIGOPS Oper. Syst. Rev.\u00a033(5), 140\u2013153 (1999)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"15_CR10","unstructured":"Ford, B., Cox, R.: Vx32: lightweight user-level sandboxing on the x86. In: ATC 2008: USENIX 2008 Annual Technical Conference on Annual Technical Conference, Berkeley, CA, USA, pp. 293\u2013306. USENIX Association (2008)"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/1133373.1133393","volume-title":"EW 10: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop","author":"M.M. Swift","year":"2002","unstructured":"Swift, M.M., Martin, S., Levy, H.M., Eggers, S.J.: Nooks: an architecture for reliable device drivers. In: EW 10: Proceedings of the 10th Workshop on ACM SIGOPS European Workshop, pp. 102\u2013107. ACM, New York (2002)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. In: Proceedings of ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI 2007) (June 2007)","DOI":"10.1145\/1250734.1250746"},{"key":"15_CR13","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood., K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: Proceedings of Programming Language Design and Implementation (PLDI) (June 2005)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Bruening, D., Garnett, T., Amarasinghe, S.: An infrastructure for adaptive dynamic optimization. In: Proceedings of the International Symposium on Code Generation and Optimization, pp. 265\u2013275 (2003)","DOI":"10.1109\/CGO.2003.1191551"},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1177\/109434200001400404","volume":"14","author":"B. Buck","year":"2000","unstructured":"Buck, B., Hollingsworth, J.K.: An API for Runtime Code Patching. The International Journal of High Performance Computing Applications\u00a014(4), 317\u2013329 (Winter 2000)","journal-title":"The International Journal of High Performance Computing Applications"},{"key":"15_CR16","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure Execution Via Program Shepherding. In: Proceedings of the 11th USENIX Security Symposium (August 2002)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity: Principles, Implementations, and Applications. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"15_CR18","unstructured":"Roscoe, T., Elphinstone, K., Heiser, G.: Hype and Virtue. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HOTOS XI) (May 2007)"},{"key":"15_CR19","unstructured":"Karger, P.A., Safford, D.R.: Security and Performance Trade-Offs in I\/O Operations for Virtual Machine Monitors. In: IBM Research Technical Report RC24500 (W0802-069) (February 2008)"},{"key":"15_CR20","volume-title":"The Java Language Specification","author":"J. Gosling","year":"2005","unstructured":"Gosling, J., Joy, B., Steele Jr., G.L., Bracha, G.: The Java Language Specification, 3rd edn. Addison Wesley, Reading (2005)","edition":"3"},{"key":"15_CR21","unstructured":"Appel, A., Govindavajhala, S.: Using Memory Errors to Attack a Virtual Machine. In: IEEE Symposium on Security and Privacy (2003)"},{"key":"15_CR22","unstructured":"Chen, H., Wagner, D., Dean, D.: Setuid demystified. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, pp. 171\u2013190. USENIX Association (2002)"},{"key":"15_CR23","unstructured":"Tsafrir, D., Silva, D.D., Wagner, D.: The murky issue of changing process identity: revising \u201csetuid demystified\u201d. In: USENIX; login: (June 2008)"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1455770.1455776","volume-title":"Proceedings of CCS 2008","author":"E. Buchanan","year":"2008","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, October 2008, pp. 27\u201338. ACM Press, New York (2008)"},{"key":"15_CR25","unstructured":"Hund, R., Holz, T., Freiling, F.: Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In: Proceedings of the 18th USENIX Security Symposium (2009)"},{"key":"15_CR26","unstructured":"scut \/\u00a0team teso: Exploiting format string vulnerabilities, Version 1.0 (March 2001)"},{"key":"15_CR27","unstructured":"gera, riq: Exploiting Format String Vulnerabilities. Phrack 59(7) (July 2002)"},{"key":"15_CR28","unstructured":"anonymous author: Once upon a free. Phrack 57(9) (August 2001)"},{"key":"15_CR29","unstructured":"MaXX: Vudo malloc tricks. Phrack 57(8) (August 2001)"},{"key":"15_CR30","unstructured":"Durden, T.: Bypassing PaX ASLR protection. Phrack\u00a059(5) (July 2002)"},{"key":"15_CR31","unstructured":"Designer, S.: Getting around non-executable stack (and fix). Bugtraq mailing list (August 1997)"},{"key":"15_CR32","unstructured":"Wojtczuk, R.: Defeating solar designer non-executable stack patch. Bugtraq mailing list (1998)"},{"key":"15_CR33","unstructured":"nergal: Advanced return-into-lib(c) exploits (PaX case study). Phrack 58(4) (December 2001)"},{"key":"15_CR34","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1145\/1315245.1315313","volume-title":"Proceedings of CCS 2007","author":"H. Shacham","year":"2007","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, October 2007, pp. 552\u2013561. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:44:42Z","timestamp":1606185882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}