{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:00:48Z","timestamp":1729674048213,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/malware.2011.6112325","type":"proceedings-article","created":{"date-parts":[[2011,12,29]],"date-time":"2011-12-29T16:04:25Z","timestamp":1325174665000},"page":"42-49","source":"Crossref","is-referenced-by-count":0,"title":["Results-oriented security"],"prefix":"10.1109","author":[{"given":"Matt","family":"Bishop","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Ramilli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242869"},{"key":"18","article-title":"Vulnerability-specific execution filtering for exploit prevention on commodity software","author":"newsome","year":"0","journal-title":"Proceedings of the 2006 Symposium on Network and Distributed Systems Feb 2006"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653725"},{"key":"16","first-page":"1","article-title":"Empirical estimates and observations of 0day vulnerabilities","author":"mcqueen","year":"2009","journal-title":"Proceedings of the 42nd Haeaii International Conference on System Sciences"},{"key":"13","article-title":"Behavior-based spyware detection","author":"kirda","year":"0","journal-title":"Proceedings of the 15th USENIX Security Symposium Aug 2006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601332"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2006.10.005"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368521"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1003"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185358"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920305"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335188"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665788"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112320"},{"key":"27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1145\/1315245.1315312","article-title":"On the infeasibility of modeling polymorphic shellcode","author":"song","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"journal-title":"The Art of Computer Virus Research and Defense","year":"2005","author":"szor","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366187"},{"journal-title":"A Short Course on Computer Viruses","year":"1994","author":"cohen","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_35"},{"key":"1","article-title":"AlephOne. Smashing the stack for fun and profit","volume":"7","year":"1996","journal-title":"Phrack"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029625"},{"key":"6","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1145\/1102120.1102152","article-title":"On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic exploits","author":"crandall","year":"2005","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1455258.1455259"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015489"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461950"}],"event":{"name":"2011 6th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2011,10,18]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2011,10,19]]}},"container-title":["2011 6th International Conference on Malicious and Unwanted Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6104282\/6112317\/06112325.pdf?arnumber=6112325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T15:55:10Z","timestamp":1561132510000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6112325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/malware.2011.6112325","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}