{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:58:57Z","timestamp":1725454737883},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387883"},{"type":"electronic","value":"9783642387890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38789-0_6","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T17:40:19Z","timestamp":1367516419000},"page":"61-75","source":"Crossref","is-referenced-by-count":0,"title":["Intercept: Profiling Windows Network Device Drivers"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Mendon\u00e7a","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Hunt, G., Brubacher, D.: Detours: Binary Interception of Win32 Functions. In: Proc. of the Conf. of USENIX Windows NT Symposium (1999)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Skaletsky, A., Devor, T., Chachmon, N., Cohn, R., Hazelwood, K., Vladimirov, V., Bach, M.: Dynamic Program Analysis of Microsoft Windows Applications. In: Proc. of the Int. Symp. on Performance Analysis of Systems & Software (2010)","DOI":"10.1109\/ISPASS.2010.5452079"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An Empirical Study of Operating System Errors. In: Proc. of the Symp. on Operating Systems Principles (October 2001)","DOI":"10.21236\/ADA419594"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Mendon\u00e7a, M., Neves, N.: Robustness testing of the Windows DDK. In: Proc. of the Int. Conf. on Dependable Systems and Networks (June 2007)","DOI":"10.1109\/DSN.2007.85"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Albinet, A., Arlat, J., Fabre, J.-C.: Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel. In: Proc. of the Int. Conf. on Dependable Systems and Networks (June 2004)","DOI":"10.1109\/DSN.2004.1311957"},{"key":"6_CR6","unstructured":"Dur\u00e3es, J., Madeira, H.: Characterization of operating systems behavior in the presence of faulty drivers through software fault emulation. In: Proc. of the Pacific Rim Int. Symp. of Dependable Computing (December 2002)"},{"key":"6_CR7","unstructured":"Johansson, A., Suri, N.: Error Propagation Profiling of Operating Systems. In: Proc. of the Int. Conf. on Dependable Systems and Networks (July 2005)"},{"key":"6_CR8","unstructured":"Microsoft, Microsoft Portable Executable and Common Object File Format Specification (February 2005)"},{"key":"6_CR9","unstructured":"WDK 8.0 (July 2012), \n                    \n                      http:\/\/msdn.microsoft.com\/en-US\/windows\/hardware\/hh852362"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D. Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/11513988_17","volume-title":"Computer Aided Verification","author":"G. Balakrishnan","year":"2005","unstructured":"Balakrishnan, G., Reps, T., Kidd, N., Lal, A.K., Lim, J., Melski, D., Gruian, R., Yong, S., Chen, C.-H., Teitelbaum, T.: Model checking x86 executables with CodeSurfer\/x86 and WPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 158\u2013163. Springer, Heidelberg (2005)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Henri-Gros, C., Kamsky, A., McPeak, S., Engler, D.: A few billion lines of code later: using static analysis to find bugs in the real world. Communications of the ACM\u00a053(2) (2010)","DOI":"10.1145\/1646353.1646374"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Bergan, T., Anderson, O., Devietti, J., Ceze, L., Grossman, D.: CoreDet: a compiler and runtime system for deterministic multi-threaded execution. In: Proc of the Int. Conf. on Architectural Support for Programming Languages and Operating Systems (March 2010)","DOI":"10.1145\/1736020.1736029"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Pasareanu, C., Mehlitz, P., Bushnell, D., Gundy-Burlet, K., Lowry, M., Person, S., Pape, M.: Combining unit-level symbolic execution and system-level concrete execution for testing NASA software. In: Proc. of the Int. Symp. on Software Testing and Analysis (July 2008)","DOI":"10.1145\/1390630.1390635"},{"key":"6_CR15","unstructured":"The LLVM Compiler Infrastructure (February 2013), \n                    \n                      http:\/\/llvm.org\/"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chipounov, V., Candea, G.: Enabling Sophisticated Analysis of x86 Binaries with RevGen. In: Proc. of the Int. Conf. on Dependable Systems and Networks (June 2011)","DOI":"10.1109\/DSNW.2011.5958815"},{"key":"6_CR17","unstructured":"Libpcap file format (February 2013), \n                    \n                      http:\/\/wiki.wireshark.org"},{"key":"6_CR18","unstructured":"WireShark (February 2013), \n                    \n                      http:\/\/www.wireshark.org\/"},{"key":"6_CR19","unstructured":"Sweex (February 2013), \n                    \n                      http:\/\/www.sweexdirect.co.uk"},{"key":"6_CR20","unstructured":"WinDbg (February 2013), \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/windows\/hardware\/gg463009.aspx"},{"key":"6_CR21","unstructured":"SystemTap (February 2013), \n                    \n                      http:\/\/wiki.eclipse.org\/Linux_Tools_Project\/Systemtap"},{"key":"6_CR22","unstructured":"Ftrace (February 2013), \n                    \n                      http:\/\/lwn.net\/Articles\/322666\/"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Passing, J., Schmitdt, A., Lowis, M., Polze, A.: NTrace: Function Boundary Tracing for Windows on IA-32. In: Proc. of the Working Conf. on Reverse Engineering (October 2009)","DOI":"10.1109\/WCRE.2009.12"},{"key":"6_CR24","unstructured":"Bruening, D., Garnett, T., Amarasinghe, S.: An Infrastructure for Adaptive Dynamic Optimization. In: Proc. of the Int. Symp. on Code Generation and Optimization (March 2003)"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38789-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:26:13Z","timestamp":1557689173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38789-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387883","9783642387890"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38789-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}