{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:40Z","timestamp":1725575260129},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_15","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"166-180","source":"Crossref","is-referenced-by-count":3,"title":["Artificial Malware Immunization Based on Dynamically Assigned Sense of Self"],"prefix":"10.1007","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"ghttpd Daemon Buffer Overflow Vulnerability, \n                    \n                      http:\/\/www.securityfocus.com\/bid\/2879"},{"key":"15_CR2","unstructured":"Snort Open Source Network Intrusion Prevention and Detection System (IDS\/IPS), \n                    \n                      http:\/\/www.snort.org\/"},{"key":"15_CR3","unstructured":"Snort\/Sourcefire DCE\/RPC Packet Reassembly Stack Buffer Overflow Vulnerability, \n                    \n                      http:\/\/www.securityfocus.com\/bid\/22616"},{"key":"15_CR4","first-page":"340","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005)","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity: Principles, Implementations, and Applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 340\u2013353. ACM, New York (November 2005)"},{"key":"15_CR5","unstructured":"Alexey Smirnov, T.-c.C.: DIRA: Automatic detection, identification, and repair of controlhijacking attacks. In: Proceedings of the 12th Network and Distributed System Security Symposium, NDSS 2005 (February 2005)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/948109.948147","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)","author":"E. Barrantes","year":"2003","unstructured":"Barrantes, E., Ackley, D., Forrest, S., Palmer, T., Stefanovic, D., Zovi, D.: Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 281\u2013289. ACM, New York (October 2003)"},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1053283.1053286","volume":"8","author":"G. Barrantes","year":"2005","unstructured":"Barrantes, G., Ackley, D., Forrest, S., Stefanovic, D.: Randomized Instruction Set Emulation. ACM Transactions on Information Systems Security (TISSEC)\u00a08(1), 3\u201340 (2005)","journal-title":"ACM Transactions on Information Systems Security (TISSEC)"},{"key":"15_CR8","volume-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006)","author":"S. Bhatkar","year":"2006","unstructured":"Bhatkar, S., Chaturvedi, A., Sekar, R.: Dataflow Anomaly Detection. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006). IEEE, Los Alamitos (May 2006)"},{"key":"15_CR9","volume-title":"Self and Not-Self","author":"F.M. Burnet","year":"1969","unstructured":"Burnet, F.M.: Self and Not-Self. Cambridge University Press, Cambridge (1969)"},{"key":"15_CR10","unstructured":"Castro, M., Costa, M., Harris, T.: Securing Software by Enforcing Data-Flow Integrity. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006), pp. 147\u2013160 (November 2006)"},{"key":"15_CR11","unstructured":"Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.K.: Non-Control-Data Attacks Are Realistic Threats. In: Proceedings of the 14th USENIX Security Symposium. USENIX (August 2005)"},{"key":"15_CR12","unstructured":"Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th USENIX Security Symposium, pp. 63\u201378. USENIX (August 1998)"},{"key":"15_CR13","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003)","author":"H.H. Feng","year":"2003","unstructured":"Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly Detection Using Call Stack Information. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003). IEEE, Los Alamitos (May 2003)"},{"issue":"10","key":"15_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"15_CR15","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy (S&P 1996)","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (S&P 1996). IEEE, Los Alamitos (May 1996)"},{"key":"15_CR16","unstructured":"Frantzen, M., Shuey, M.: StackGhost: Hardware Facilitated Stack Protection. In: Proceedings of the 10th USENIX Security Symposium, pp. 55\u201366. USENIX (August 2001)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11663812_10","volume-title":"Recent Advances in Intrusion Detection","author":"J.T. Giffin","year":"2006","unstructured":"Giffin, J.T., Dagon, D., Jha, S., Lee, W., Miller, B.P.: Environment-Sensitive Intrusion Detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 185\u2013206. Springer, Heidelberg (2006)"},{"key":"15_CR18","volume-title":"Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005)","author":"R. Gopalakrishna","year":"2005","unstructured":"Gopalakrishna, R., Spafford, E.H., Vitek, J.: Efficient Intrusion Detection using Automaton Inlining. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005). IEEE, Los Alamitos (May 2005)"},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2006.41","volume":"3","author":"T. Jim","year":"2006","unstructured":"Jim, T., Schlichting, R.D., Rajagopalan, M., Hiltunen, M.A.: System Call Monitoring Using Authenticated System Calls. IEEE Transactions on Dependable and Secure Computing\u00a03(3), 216\u2013229 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"15_CR20","volume-title":"Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS 2003)","author":"Z.K. Jun Xu","year":"2003","unstructured":"Jun Xu, Z.K., Iyer, R.K.: Transparent Runtime Randomization for Security. In: Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS 2003). IEEE, Los Alamitos (October 2003)"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1145\/948109.948146","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)","author":"G.S. Kc","year":"2003","unstructured":"Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering Code-Injection Attacks with Instruction-Set Randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 272\u2013280. ACM, New York (October 2003)"},{"key":"15_CR22","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure Execution via Program Shepherding. In: Proceedings of the 11th USENIX Security Symposium, pp. 191\u2013206. USENIX (August 2002)"},{"key":"15_CR23","volume-title":"Immunology: The Science of Self-Nonself Discrimination","author":"J. Klein","year":"1982","unstructured":"Klein, J.: Immunology: The Science of Self-Nonself Discrimination. John Wiley & Sons, New York (1982)"},{"key":"15_CR24","unstructured":"Linn, C.M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S.K., Hartman, J.H.: Protecting against Unexpected System Calls. In: Proceedings of the 14th USENIX Security Symposium. USENIX (August 2005)"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TDSC.2006.14","volume":"3","author":"D. Nebenzahl","year":"2006","unstructured":"Nebenzahl, D., Sagiv, M., Wool, A.: Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Transactions on Dependable and Secure Computing (TDSC)\u00a03(1), 78\u201390 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)"},{"key":"15_CR26","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2007)","author":"N. Petroni","year":"2007","unstructured":"Petroni, N., Hicks, M.: Automated Detection of Persistent Kernel Control-Flow Attacks. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2007). ACM, New York (October 2007)"},{"key":"15_CR27","volume-title":"Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005)","author":"M. Rajagopalan","year":"2005","unstructured":"Rajagopalan, M., Hiltunen, M., Jim, T., Schlichting, R.: Authenticated System Calls. In: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005). IEEE, Los Alamitos (June 2005)"},{"key":"15_CR28","unstructured":"Sandeep Bhatkar, R.S., DuVarney, D.C.: Efficient Techniques for Comprehensive Protection from Memory Error Exploits. In: Proceedings of the 14th USENIX Security Symposium. USENIX (August 2005)"},{"key":"15_CR29","volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P 2001)","author":"R. Sekar","year":"2001","unstructured":"Sekar, R., Bendre, M., Bollineni, P.: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P 2001). IEEE, Los Alamitos (May 2001)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pp. 15\u201328 (October 2003)","DOI":"10.1145\/945445.945448"},{"key":"15_CR31","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)","author":"H. Shacham","year":"2007","unstructured":"Shacham, H.: The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007). ACM, New York (October 2007)"},{"key":"15_CR32","volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P 2001)","author":"D. Wagner","year":"2001","unstructured":"Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P 2001). IEEE, Los Alamitos (May 2001)"},{"key":"15_CR33","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)","author":"D. Wagner","year":"2002","unstructured":"Wagner, D., Soto, P.: Mimicry Attacks on Host-Based Intrusion Detection Systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002). ACM, New York (October 2002)"},{"key":"15_CR34","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006)","author":"X. Wang","year":"2006","unstructured":"Wang, X., Li, Z., Xu, J., Reiter, M.K., Kil, C., Choi, J.Y.: Packet Vaccine: Black-box Exploit Detection and Signature Generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006). ACM, New York (October 2006)"},{"key":"15_CR35","first-page":"133","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (S&P 1999)","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy (S&P 1999), pp. 133\u2013145. IEEE, Los Alamitos (May 1999)"},{"key":"15_CR36","unstructured":"Wilander, J., Kamkar, M.: A comparison of publicly available tools for dynamic buffer overflow prevention. In: Proceedings of the 10th Network and Distributed System Security Symposium, NDSS 2003 (Feburary 2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T21:53:47Z","timestamp":1553378027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}