{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:02:59Z","timestamp":1743825779088,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642319112"},{"type":"electronic","value":"9783642319129"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31912-9_10","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:57:56Z","timestamp":1342252676000},"page":"140-154","source":"Crossref","is-referenced-by-count":0,"title":["AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability"],"prefix":"10.1007","author":[{"given":"Kai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Yingjun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: Foundations of Intrusion Tolerant Systems (Organically Assured and Survivable Information Systems), pp. 227\u2013237 (2003)","key":"10_CR1","DOI":"10.1109\/FITS.2003.1264935"},{"issue":"11","key":"10_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1096000.1096004","volume":"48","author":"B.A. Kuperman","year":"2005","unstructured":"Kuperman, B.A., Brodley, C.E., Ozdoganoglu, H., Vijaykumar, T.N., Jalote, A.: Detection and prevention of stack buffer overflow attacks. Communications of the ACM\u00a048(11), 50\u201356 (2005)","journal-title":"Communications of the ACM"},{"unstructured":"BBC: Serious security flaw found in ie (2011), http:\/\/news.bbc.co.uk\/2\/hi\/technology\/7784908.stm","key":"10_CR3"},{"unstructured":"Hund, R., Holz, T., Freiling, F.: Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In: Proceedings of the 18th Conference on USENIX Security Symposium, pp. 383\u2013398. USENIX Association (2009)","key":"10_CR4"},{"doi-asserted-by":"crossref","unstructured":"Ganesh, V., Leek, T., Rinard, M.: Taint-based directed whitebox fuzzing. In: Proceedings of the 31st International Conference on Software Engineering, pp. 474\u2013484. IEEE Computer Society (2009)","key":"10_CR5","DOI":"10.1109\/ICSE.2009.5070546"},{"doi-asserted-by":"crossref","unstructured":"Bisht, P., Hinrichs, T., Skrupsky, N., Bobrowicz, R., Venkatakrishnan, V.: Notamper: automatic blackbox detection of parameter tampering opportunities in web applications. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 607\u2013618. ACM (2010)","key":"10_CR6","DOI":"10.1145\/1866307.1866375"},{"unstructured":"Avgerinos, T., Cha, S., Hao, B., Brumley, D.: Aeg: Automatic exploit generation. In: Proceedings of the Network and Distributed System Security Symposium (2011)","key":"10_CR7"},{"unstructured":"Baratloo, A., Singh, N., Tsai, T.: Transparent run-time defense against stack smashing attacks. In: Proceedings of the USENIX Annual Technical Conference, pp. 251\u2013262 (2000)","key":"10_CR8"},{"doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307. ACM (2004)","key":"10_CR9","DOI":"10.1145\/1030083.1030124"},{"doi-asserted-by":"crossref","unstructured":"Kil, C., Jun, J., Bookholt, C., Xu, J., Ning, P.: Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In: 22nd Annual Computer Security Applications Conference, ACSAC 2006, pp. 339\u2013348. IEEE (2006)","key":"10_CR10","DOI":"10.1109\/ACSAC.2006.9"},{"doi-asserted-by":"crossref","unstructured":"Sezer, E.C., Ning, P., Kil, C., Xu, J.: Memsherlock: An automated debugger for unknown memory corruption vulnerabilities (2007)","key":"10_CR11","DOI":"10.1145\/1315245.1315314"},{"issue":"7","key":"10_CR12","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1145\/358557.358577","volume":"25","author":"M. Weiser","year":"1982","unstructured":"Weiser, M.: Programmers use slices when debugging. Communications of the ACM\u00a025(7), 446\u2013452 (1982)","journal-title":"Communications of the ACM"},{"unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (2005)","key":"10_CR13"},{"unstructured":"Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: USENIX Security Symposium, vol.\u00a0286 (2004)","key":"10_CR14"},{"doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: 2005 IEEE Symposium on Security and Privacy, pp. 226\u2013241 (2005)","key":"10_CR15","DOI":"10.1109\/SP.2005.15"},{"unstructured":"Li, Z., Sanghi, M., Chen, Y., Kao, M.Y., Chavez, B.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 32\u201347 (2006)","key":"10_CR16"},{"unstructured":"Wang, X., Pan, C.C., Liu, P., Zhu, S.: Sigfree: A signature-free buffer overflow attack blocker. In: Proceedings of the 15th conference on USENIX Security (2006)","key":"10_CR17"},{"unstructured":"PaX.Team: Pax documentation (2003), http:\/\/pax.grsecurity.net\/docs\/pax.txt","key":"10_CR18"},{"doi-asserted-by":"crossref","unstructured":"Kc, G.S., Keromytis, A.D.: e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing. In: 21st Annual Computer Security Applications Conference, pp. 286\u2013302 (2005)","key":"10_CR19","DOI":"10.1109\/CSAC.2005.22"},{"doi-asserted-by":"crossref","unstructured":"McGregor, J.P., Karig, D.K., Shi, Z., Lee, R.B.: A processor architecture defense against buffer overflow attacks. In: Proceedings of International Conference on Information Technology: Research and Education, ITR 2003, pp. 243\u2013250 (2003)","key":"10_CR20","DOI":"10.1109\/ITRE.2003.1270612"},{"unstructured":"Castro, M., Costa, M., Harris, T.: Securing software by enforcing data-flow integrity (2006)","key":"10_CR21"},{"unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure execution via program shepherding. In: Proceedings of the 11th USENIX Security Symposium, pp. 191\u2013205 (2002)","key":"10_CR22"},{"unstructured":"Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection from memory error exploits. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol.\u00a014 table of contents, p. 17 (2005)","key":"10_CR23"},{"doi-asserted-by":"crossref","unstructured":"Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: end-to-end containment of internet worms. In: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, pp. 133\u2013147 (2005)","key":"10_CR24","DOI":"10.1145\/1095809.1095824"},{"doi-asserted-by":"crossref","unstructured":"Brumley, D., Wang, H., Jha, S., Song, D.: Creating vulnerability signatures using weakest preconditions. In: 20th IEEE Computer Security Foundations Symposium, pp. 311\u2013325 (2007)","key":"10_CR25","DOI":"10.1109\/CSF.2007.17"},{"doi-asserted-by":"crossref","unstructured":"Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 2\u201316 (2006)","key":"10_CR26","DOI":"10.1109\/SP.2006.41"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/1315245.1315261","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"H. Yin","year":"2007","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 116\u2013127. ACM, New York (2007)"},{"unstructured":"Bayer, U., Kruegel, C., Kirda, E.: Ttanalyze: A tool for analyzing malware. In: 15th Annual Conference of the European Institute for Computer Antivirus Research, EICAR (2006)","key":"10_CR28"},{"doi-asserted-by":"crossref","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 85\u201396 (2004)","key":"10_CR29","DOI":"10.1145\/1024393.1024404"},{"unstructured":"King, S.T., Dunlap, G.W., Chen, P.M.: Debugging operating systems with time-traveling virtual machines. In: Proceedings of the USENIX 2005 Annual Technical Conference (2005)","key":"10_CR30"},{"issue":"2","key":"10_CR31","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/316686.316687","volume":"21","author":"G. Ramalingam","year":"1999","unstructured":"Ramalingam, G.: Identifying loops in almost linear time. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a021(2), 175\u2013188 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"6","key":"10_CR32","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/236114.236115","volume":"18","author":"V.C. Sreedhar","year":"1996","unstructured":"Sreedhar, V.C., Gao, G.R., Lee, Y.F.: Identifying loops using dj graphs. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a018(6), 649\u2013658 (1996)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"unstructured":"Bellard, F.: Qemu, a fast and portable dynamic translator. In: Proceedings of the USENIX Annual Technical Conference, FREENIX Track, pp. 41\u201346 (2005)","key":"10_CR33"},{"unstructured":"Milw0rm: milw0rm-exploits: vulnerabilities: videos: papers: shellcode (2008), http:\/\/www.milw0rm.com\/","key":"10_CR34"},{"unstructured":"Microsoft: Microsoft security bulletin ms06-055 (2006), http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS06-055.mspx","key":"10_CR35"},{"unstructured":"techFAQ: What is a format string vulnerability? (2011), http:\/\/www.tech-faq.com\/format-string-vulnerability.shtml","key":"10_CR36"},{"unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. University of Auckland Technical Report 170 (1997)","key":"10_CR37"},{"doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 290\u2013299 (2003)","key":"10_CR38","DOI":"10.1145\/948148.948149"},{"doi-asserted-by":"crossref","unstructured":"Ho, A., Fetterman, M., Clark, C., Warfield, A., Hand, S.: Practical taint-based protection using demand emulation. In: Proceedings of the 2006 EuroSys Conference, pp. 29\u201341 (2006)","key":"10_CR39","DOI":"10.1145\/1217935.1217939"},{"unstructured":"Qin, F., Lu, S., Zhou, Y.: Safemem: exploiting ecc-memory for detecting memory leaks and memory corruption during production runs. In: 11th International Symposium on High-Performance Computer Architecture, HPCA-11, pp. 291\u2013302 (2005)","key":"10_CR40"},{"doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H., Zhou, Y., Wu, Y.: Lift: A low-overhead practical information flow tracking system for detecting security attacks. In: Proceedings of the Annual IEEE\/ACM International Symposium on Microarchitecture (Micro 2006), Orlando, Florida, USA (December 2006)","key":"10_CR41","DOI":"10.1109\/MICRO.2006.29"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31912-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:07:51Z","timestamp":1743739671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31912-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642319112","9783642319129"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31912-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}