{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:46:51Z","timestamp":1759092411641,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231411","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"220-225","source":"Crossref","is-referenced-by-count":29,"title":["A network worm vaccine architecture"],"prefix":"10.1109","author":[{"given":"S.","family":"Sidiroglou","sequence":"first","affiliation":[]},{"given":"A.D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"123","article-title":"A Comparison of Publicly Available Tools for Dynamic Intrusion Prevention","author":"wilander","year":"2003","journal-title":"Proc the Symposium on Network and Distributed System Security (SNDSS '96)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060308"},{"key":"ref33","article-title":"The Internet Worm Program: An Analysis","author":"spafford","year":"1988","journal-title":"Technical Report CSD-TR-823"},{"key":"ref32","article-title":"A Snapshot of Global Internet Worm Activity","author":"song","year":"2001","journal-title":"Technical Report Arbor Networks"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/244804.244807"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898879"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45127-7_27"},{"key":"ref35","article-title":"Connection-history Based Anomaly Detection","author":"toth","year":"2002","journal-title":"In Proceedings of the IEEE Workshop on Information Assurance and Security"},{"key":"ref34","first-page":"149","article-title":"How to Own the Internet in Your Spare Time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref10","article-title":"Bypassing StackGuard and StackShield","volume":"5","author":"bulba","year":"2000","journal-title":"Phrack"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"ref11","article-title":"Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"article-title":"GCC extension for protecting applications from stack-smashing attacks","year":"2000","author":"etoh","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref15","first-page":"163","article-title":"Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools","author":"garflnkel","year":"2003","journal-title":"Proc the Symposium on Network and Distributed System Security (SNDSS '96)"},{"key":"ref16","first-page":"191","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","author":"garflnkel","year":"2003","journal-title":"Proc the Symposium on Network and Distributed System Security (SNDSS '96)"},{"key":"ref17","article-title":"A Secure Environment for Untrusted Helper Applications","author":"goldberg","year":"1996","journal-title":"Proc Usenix 1996 Ann Technical Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"ref19","first-page":"191","article-title":"Secure Execution Via Program Shepherding","author":"kiriansky","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref28","article-title":"Improving Host Security with System Call Policies","author":"provos","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"year":"2001","key":"ref4","article-title":"CERL Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242869"},{"year":"0","key":"ref3","article-title":"VMWare Emulator"},{"year":"2003","key":"ref6","article-title":"The Spread of the Sapphire\/Slammer Worm"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028912"},{"year":"2003","key":"ref5","article-title":"Cert Advisory CA-2003-04: MS-SQL Server Worm"},{"key":"ref8","article-title":"Transparent Run-Time Defense Against Stack Smashing Attacks","author":"baratloo","year":"2000","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"ref7","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack"},{"year":"0","key":"ref2"},{"article-title":"The Shockwave Rider","year":"1975","author":"brunner","key":"ref9"},{"year":"0","key":"ref1","article-title":"2001 Economic Impact of Malicious Code Attacks"},{"key":"ref20","first-page":"81","article-title":"Type-Assisted Dynamic Buffer Overflow Detection","author":"lhee","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref22","article-title":"Welcome To My Tarpit: the Tactical and Strategic Use of LaBrea","author":"liston","year":"2001","journal-title":"Technical Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310928"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(93)90031-U"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref23","article-title":"w00w00 on heap overflows","author":"conover","year":"1999","journal-title":"w00w00 Security Team"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/637241.637244"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231411.pdf?arnumber=1231411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:28:39Z","timestamp":1489436919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231411","relation":{},"subject":[]}}