{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:00:15Z","timestamp":1769857215554,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642371189","type":"print"},{"value":"9783642371196","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_17","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T20:34:59Z","timestamp":1364330099000},"page":"261-277","source":"Crossref","is-referenced-by-count":17,"title":["GHUMVEE: Efficient, Effective, and Flexible Replication"],"prefix":"10.1007","author":[{"given":"Stijn","family":"Volckaert","sequence":"first","affiliation":[]},{"given":"Bjorn","family":"De Sutter","sequence":"additional","affiliation":[]},{"given":"Tim","family":"De Baets","sequence":"additional","affiliation":[]},{"given":"Koen","family":"De Bosschere","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Akritidis, P., Costa, M., et al.: Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. In: Proc. USENIX SSYM, pp. 51\u201366 (2009)"},{"key":"17_CR2","unstructured":"Aleph One: Smashing the stack for fun and profit. Phrack Magazine\u00a07(49) (1996)"},{"key":"17_CR3","unstructured":"Anckaert, B.: Diversity for Software Protection. PhD thesis, Ghent University (2008)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Anckaert, B., Jakubowski, M., Venkatesan, R.: Proteus: virtualization for diversified tamper-resistance. In: Proc. ACM DRM, pp. 47\u201358 (2006)","DOI":"10.1145\/1179509.1179521"},{"key":"17_CR5","unstructured":"Baratloo, A., Singh, N., Tsai, T.: Libsafe: Protecting critical elements of stacks. White paper, Bell Labs, Lucent Technologies (December 1999)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Berger, E., Zorn, B.: DieHard: probabilistic memory safety for unsafe languages. In: Proc. ACM PLDI, pp. 158\u2013168 (2006)","DOI":"10.1145\/1133255.1134000"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Berger, E.D., Zorn, B.G., McKinley, K.S.: Reconsidering custom memory allocation. In: Proc. ACM OOPSLA, pp. 1\u201312 (2002)","DOI":"10.1145\/583854.582421"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Bruschi, D., Cavallaro, L.: Diversified Process Replic\u00e6for Defeating Memory Error Exploits. In: Proc. IEEE IPCCC, pp. 434\u2013441 (2007)","DOI":"10.1109\/PCCC.2007.358924"},{"key":"17_CR9","unstructured":"Cavallaro, L.: Comprehensive Memory Error Protection via Diversity and Taint-Tracking. PhD thesis, Universita Degli Studi Di Milano (2007)"},{"key":"17_CR10","unstructured":"Chen, S., Xu, J., Sezer, E., Gauriar, P.: Non-control-data attacks are realistic threats. In: Proc. USENIX SSYM (2005)"},{"key":"17_CR11","unstructured":"Chiueh, T.C., Hsu, F.H.: RAD: A Compile-Time Solution to Buffer Overflow Attacks. In: Proc. IEEE ICDCS, pp. 409\u2013417 (2001)"},{"key":"17_CR12","unstructured":"Cowan, C., Pu, C., et al.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proc. USENIX SSYM, pp. 26\u201329 (1998)"},{"key":"17_CR13","unstructured":"Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities. In: Proc. USENIX SSYM, pp. 91\u2013104 (2003)"},{"key":"17_CR14","unstructured":"Cox, B., Evans, D., et al.: N-variant systems: A secretless framework for security through diversity. In: Proc. USENIX SSYM, pp. 105\u2013120 (2006)"},{"key":"17_CR15","unstructured":"Curry, T.W.: Profiling and Tracing Dynamic Library Usage Via Interposition. In: Proc. USENIX USTC, pp. 267\u2013278 (1994)"},{"key":"17_CR16","unstructured":"Holtmann, M.: Secure Programming with GCC and GLibc (2008)"},{"key":"17_CR17","unstructured":"Franke, H., Russell, R., Kirkwood, M.: Fuss, Futexes and Furwocks: Fast Userlevel Locking in Linux. In: Proc. Ottowa Linux Symposium (2002)"},{"key":"17_CR18","unstructured":"Hunt, G., Brubacher, D.: Detours: Binary Interception of Win32 Functions. In: Proc. USENIX WINSYM (1999)"},{"key":"17_CR19","unstructured":"IBM Research: GCC extension for protecting applications from stack-smashing attacks (2005)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Kil, C., Jun, J., Bookholt, C., Xu, J., Ning, P.: Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In: Proc. ACSAC, pp. 339\u2013348 (2006)","DOI":"10.1109\/ACSAC.2006.9"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"McGregor, J.P., Karig, D.K., Shi, Z., Lee, R.B.: A Processor Architecture Defense against Buffer Overflow Attacks (2003)","DOI":"10.1109\/ITRE.2003.1270612"},{"key":"17_CR22","unstructured":"Microsoft Corporation: Data Execution Prevention"},{"key":"17_CR23","unstructured":"Microsoft Corporation: Security Enhancements in the CRT"},{"key":"17_CR24","unstructured":"Microsoft Corporation: Visual C++ Linker Options: \/GS (Buffer Security Check) (2002)"},{"key":"17_CR25","unstructured":"Miller, T.C., de Raadt, T.: strlcpy and strlcat Consistent, Safe, String Copy and Concatenation. In: Proc. USENIX ATEC, pp. 175\u2013178 (1999)"},{"key":"17_CR26","unstructured":"Molnar, I.: \u201dExec Shield\u201d, new Linux security feature"},{"key":"17_CR27","unstructured":"Nergal: The advanced return-into-lib(c) exploits. Phrack Magazine 12(58) (2001)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen-Tuong, A., Evans, D., Knight, J.C., Cox, B., Davidson, J.W.: Security through redundant data diversity. In: Proc. IEEE DSN, pp. 187\u2013196 (2008)","DOI":"10.1109\/DSN.2008.4630087"},{"key":"17_CR29","unstructured":"PaX Team: Address Space Layout Randomization (2004)"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2133375.2133377","volume":"15","author":"R. Roemer","year":"2012","unstructured":"Roemer, R., Buchanan, E., et al.: Return-oriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur.\u00a015, 2:1\u20132:34 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"17_CR31","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/312203.312214","volume":"17","author":"M. Ronsse","year":"1999","unstructured":"Ronsse, M., De Bosschere, K.: RecPlay: A Fully Integrated Practical Record\/Replay System. ACM Trans. Comp. Sys.\u00a017(2), 133\u2013152 (1999)","journal-title":"ACM Trans. Comp. Sys."},{"key":"17_CR32","unstructured":"Salamat, B., Gal, A., Franz, M.: Reverse stack execution in a multi-variant execution environment. In: CATARS Workshop (2008)"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Salamat, B., Jackson, T., et al.: Orchestra: A User Space Multi-Variant Execution Environment. In: Proc. EuroSys, pp. 33\u201346 (2009)","DOI":"10.1145\/1519065.1519071"},{"key":"17_CR34","unstructured":"Salamat, B.: Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks. PhD thesis, University of California, Irvine (2009)"},{"key":"17_CR35","doi-asserted-by":"crossref","unstructured":"Salamat, B., Gal, A., et al.: Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. In: Proc. CICIS, pp. 843\u2013848 (2008)","DOI":"10.1109\/CISIS.2008.136"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Salamat, B., Jackson, T., et al.: Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. In: Proc. EuroSys, pp. 33\u201346 (2009)","DOI":"10.1145\/1519065.1519071"},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"Shacham, H., Goh, E.J., Modadugu, N., Pfaff, B., Boneh, D.: On the effectiveness of address-space randomization (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"17_CR38","unstructured":"The GNU C Library: Copying and Concatenation"},{"key":"17_CR39","unstructured":"Thorvalds, L.: Linux Programmer\u2019s Manual"},{"key":"17_CR40","unstructured":"Tsai, T., Singh, N.: Libsafe 2.0: Detection of Format String Vulnerability Exploits (2001)"},{"issue":"1","key":"17_CR41","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2009.18","volume":"7","author":"D. Williams","year":"2009","unstructured":"Williams, D., Hu, W., et al.: Security through Diversity: Leveraging Virtual Machine Technology. IEEE Security & Privacy\u00a07(1), 26\u201333 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"17_CR42","unstructured":"Xiong, W., Park, S., Zhang, J., Zhou, Y., Ma, Z.: Ad hoc synchronization considered harmful. In: Proc. USENIX OSDI, pp. 1\u20138 (2010)"},{"key":"17_CR43","unstructured":"Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent Runtime Randomization for Security. In: Proc. SRDS 2003, pp. 260\u2013269 (2003)"},{"key":"17_CR44","doi-asserted-by":"crossref","unstructured":"Younan, Y., Philippaerts, P., et al.: Paricheck: an efficient pointer arithmetic checker for C programs. In: Proc. ASIACCS, pp. 145\u2013156 (2010)","DOI":"10.1145\/1755688.1755707"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T20:28:50Z","timestamp":1557606530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}