{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:43:42Z","timestamp":1744418622732,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575125","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"121-128","source":"Crossref","is-referenced-by-count":9,"title":["Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks"],"prefix":"10.1109","author":[{"given":"Daniela A. S. de","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Jedidiah R.","family":"Crandall","sequence":"additional","affiliation":[]},{"given":"Gary","family":"Wassermann","sequence":"additional","affiliation":[]},{"given":"Shaozhi","family":"Ye","sequence":"additional","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[]},{"given":"Frederic T.","family":"Chong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","first-page":"135","article-title":"lift: a low-overhead practical information flow tracking system for detecting security attacks","author":"qin","year":"2006","journal-title":"MICRO-39"},{"year":"0","key":"36"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"39","article-title":"building a reactive immune system for software services","author":"sidiroglou","year":"2005","journal-title":"USENIX"},{"year":"0","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.38"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.45"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146625"},{"journal-title":"Virtual Machines Versatile Platforms for Systems and Processes","year":"2005","author":"smith","key":"41"},{"key":"40","article-title":"dira: automatic detection, identification, and repair of control-hijacking attacks","author":"smirnov","year":"2005","journal-title":"NDSS"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466961"},{"key":"23","article-title":"remote windows kernel exploitation - step into the ring 0","author":"jack","year":"2005","journal-title":"eEye Digital Security Whitepaper"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168884"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-8990-0"},{"key":"27","article-title":"fast and automated generation of attack signatures: a basis for building self-protected servers","author":"liang","year":"2005","journal-title":"ACM CCS"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180444"},{"key":"3","article-title":"the recovery box: using fast recovery to provide high availability in the unix environment","author":"baker","year":"1992","journal-title":"USENIX"},{"journal-title":"Understanding the Message Logging Paradigm for Masking Process Crashes","year":"1996","author":"alvisi","key":"2"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225538"},{"key":"30","article-title":"dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"NDSS"},{"key":"6","article-title":"address obfuscation: an efficent approach to combat a broad range of memory error exploits","author":"bhatkar","year":"2003","journal-title":"Usenix Security"},{"journal-title":"Concurrency Control and Recovery in Database Systems","year":"1987","author":"bernstein","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181320"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250736"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133387"},{"key":"19","article-title":"why do computers stop and what can be done about it?","author":"gray","year":"1986","journal-title":"Proc Symp Reliability Distributed Software and Database Systems"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095826"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102152"},{"key":"16","article-title":"protocol-independent adaptive replay of application dialog","author":"cui","year":"2006","journal-title":"NDSS"},{"key":"13","first-page":"63","article-title":"stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Usenix Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"11","first-page":"31","article-title":"beyond fault tolerance","volume":"30","author":"chou","year":"1997","journal-title":"IEEE Computer"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"21","first-page":"163","article-title":"back to the future: a framework for automatic malware removal and system repair","author":"hsu","year":"2006","journal-title":"ACSAC"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"year":"0","key":"49"},{"year":"0","key":"48"},{"journal-title":"UnixBench","year":"0","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273010"},{"key":"47","article-title":"automatic diagnosis and response to memory corruption vulnerabilities","author":"xu","year":"2005","journal-title":"ACM CCS"},{"year":"0","key":"46"},{"key":"10","article-title":"microreboot - a technique for cheap recovery","author":"candea","year":"2004","journal-title":"OSDI"},{"year":"0","key":"50"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575125.pdf?arnumber=4575125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:27:48Z","timestamp":1489692468000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575125","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}