{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:49:12Z","timestamp":1743094152246,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540650041"},{"type":"electronic","value":"9783540497844"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055853","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T16:50:09Z","timestamp":1154019009000},"page":"17-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A tool for pro-active defense against the buffer overrun attack"],"prefix":"10.1007","author":[{"given":"D.","family":"Bruschi","sequence":"first","affiliation":[]},{"given":"E.","family":"Rosti","sequence":"additional","affiliation":[]},{"given":"R.","family":"Banfi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"2_CR1","unstructured":"Bach, M.J.: The design of the Unix operating system. Prentice-Hall International Series, 1986."},{"key":"2_CR2","unstructured":"Bunch, S.: The setuid feature in Unix and security. Proceedings of the 10th National Security Conference, 1987."},{"key":"2_CR3","unstructured":"Computer Emergency Response Team Coordination Center: ftp:\/\/ftp.cert.org\/pub\/advisories, Carnegie Mellon University."},{"key":"2_CR4","unstructured":"Cowan, C., Pu, C., Maier, D., Hinton, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Ziang, Q.: StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. Proc. of the 7th USENIX Security Symposium, 1998."},{"key":"2_CR5","unstructured":"Dean, D., Felten, E.W., Wallach, D.S.: Java security: from HotJava to Netscape and beyond, Proc. of the IEEE Symposium on Security and Privacy, Oakland, 1996."},{"key":"2_CR6","unstructured":"Garfinkel, S., Spafford, E.: Practical UNIX and Internet Security. O\u2019Reilly and Associates, 1996."},{"key":"2_CR7","unstructured":"Gosling, J., Joy, B., Steele, J.: The Java language specification. Addison-Wesley, 1996."},{"key":"2_CR8","unstructured":"Hastings, R., Joyce, B.: Purify: fast detection of memory leaks and access errors. Proc. of the Winter USENIX Conference, 1992."},{"key":"2_CR9","unstructured":"Jones, R., Kelly, P.: Bounds checking for C. http:\/\/www-ala.doc.ic.ac.uk\/phjk\/BoundsChecking.html, July 1995."},{"key":"2_CR10","unstructured":"Kernighan, B.W., Ritchie, D.M.: The C programming language. 2nd Ed. Prentice-Hall Software Series, 1988."},{"key":"2_CR11","unstructured":"McKusick, M.K., Bostic, K., Karles, M.J., Quarterman, J.S.: The Design and Implementation of the 4.4BSD Operating System. Addison Wesley, 1996."},{"key":"2_CR12","unstructured":"Mudge: How to write buffer overflows. http:\/\/www.10pht.com\/advisories\/bufero.html 1997."},{"key":"2_CR13","unstructured":"One, A.: Smashing the stack for fun and profit. Phrack Magazine 49, Fall 1997."},{"key":"2_CR14","unstructured":"Smith, N.P.: Stack smashing vulnerabilities in the UNIX operating system. http:\/\/millcomm.com\/ nate\/machines\/security\/stack-smashing\/ 1997."},{"key":"2_CR15","unstructured":"Snarskii, A.: FreeBSD Stack integrity patch. ftp:\/\/ftp.lucky.net\/pub\/unix\/local\/libc-letter, 1997."},{"key":"2_CR16","unstructured":"Solar Designer: Non-Executable user stack. http:\/\/www.false.com\/security\/linux-stack\/."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Spafford, E.: The Internet Worm incident. Proc. of the European Software Eng. Conference, pp 203\u2013227, 1989.","DOI":"10.1007\/3-540-51635-2_54"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 98"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:07:21Z","timestamp":1559506041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540650041","9783540497844"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0055853","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}