{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:13:11Z","timestamp":1742382791224,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/iwias.2003.1192456","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"25-34","source":"Crossref","is-referenced-by-count":8,"title":["A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors"],"prefix":"10.1109","author":[{"given":"R.","family":"Chinchani","sequence":"first","affiliation":[]},{"given":"S.","family":"Upadhyaya","sequence":"additional","affiliation":[]},{"given":"K.","family":"Kwiat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/508172.508175"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/800081.802677"},{"journal-title":"Fault-Tolerant Computer System Design","year":"1996","author":"pradhan","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/90.330417"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"ref35","article-title":"Automated response using system call delays","author":"somayaji","year":"2000","journal-title":"USENIX Security Symposium"},{"journal-title":"Intrusion detection systems (a repertoire of known intrusion detection systems)","year":"2000","author":"sobirey","key":"ref34"},{"key":"ref10","article-title":"N-version programming: A fault tolerance approach to reliability of software operation. In","author":"chen","year":"1978","journal-title":"Intern Symp on Fault-Tolerant Computing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"ref12","article-title":"Buffer overflows: Attacks and defenses for the vulnerability of the decade","author":"cowan","year":"2002","journal-title":"Proc DARPA Information Survivability Conference and Exposition (DISCEX)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312834"},{"journal-title":"Daemon watcher","year":"0","author":"eriksson","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/227210.227226","article-title":"Totem: A fault-tolerant multicast group communication system","volume":"39","year":"1996","journal-title":"Communications of the ACM"},{"journal-title":"Argus","year":"0","author":"fox","key":"ref17"},{"key":"ref18","article-title":"Hardening of cots software with generic software wrappers","author":"fraser","year":"1999","journal-title":"Symposium on Security and Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"key":"ref28","article-title":"Security analysis & design: A strategy that's both practical and generic","author":"nerurkar","year":"2000","journal-title":"Dr Dobbs Journal featuring Computer Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1992.235108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"journal-title":"Freebsd problem report kern\/297 41","year":"2002","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1981.1675777"},{"key":"ref29","article-title":"A protection mechanism for an intrusion detection system based on mandatory access control","volume":"42","author":"onabuta","year":"2001","journal-title":"Information Processing Society of Japan"},{"key":"ref5","first-page":"76","article-title":"Transis: A communication sub-system for high avaliablity","author":"amir","year":"1992","journal-title":"FTCS-22"},{"key":"ref8","first-page":"131","article-title":"Checking for race conditions in file accesses","volume":"9","author":"bishop","year":"1996","journal-title":"Computing Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"journal-title":"Trusted Computer Security Evaluation Criteria","year":"1985","key":"ref2"},{"key":"ref9","first-page":"697","article-title":"Standard error classification to support software reliability assessment","author":"brown","year":"1980","journal-title":"AFIPS Conference Proceedings 1980 National Computer Conference"},{"journal-title":"Linux Security Module","year":"0","key":"ref1"},{"key":"ref20","article-title":"A user level infrastructure for system call interception: A platform for intrusion detection and confinement. In","author":"jain","year":"2000","journal-title":"Network and Distributed Systems Security Symposium (NDSS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/71.774907"},{"journal-title":"Fault Tolerance in Distributed Systems","year":"1994","author":"jalote","key":"ref21"},{"key":"ref24","article-title":"Kqueue: A generic and scalable event notification facility for freebsd","author":"lemon","year":"2000","journal-title":"BSDCon 2000"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref26","article-title":"Using kernel hyper-visors to secure applications","author":"mitchum","year":"1997","journal-title":"Annual Computer Security Conference"},{"key":"ref25","first-page":"303","article-title":"The inevitability of failure: The flawed assumption of security in modern computing environments","author":"loscocco","year":"1998","journal-title":"21st National Information Systems Security Conference"}],"event":{"name":"Proceedings First IEEE International Workshop on Information Assurance. IWIA 2003","start":{"date-parts":[[2003,3,24]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2003,3,24]]}},"container-title":["First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8484\/26740\/01192456.pdf?arnumber=1192456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:18:05Z","timestamp":1497583085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iwias.2003.1192456","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}