{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:00:23Z","timestamp":1730293223065,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,4]]},"DOI":"10.1109\/roedunet54112.2021.9638292","type":"proceedings-article","created":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T15:46:59Z","timestamp":1639151219000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Security Audit for the D Programming Language"],"prefix":"10.1109","author":[{"given":"Razvan","family":"Nitu","sequence":"first","affiliation":[]},{"given":"Eduard","family":"Staniloiu","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Done","sequence":"additional","affiliation":[]},{"given":"Razvan","family":"Rughinis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"560","article-title":"Guidelines for discovering and improving application security","author":"gabriel","year":"2013","journal-title":"2013 19th International Conference on Control Systems and Computer Science"},{"key":"ref11","article-title":"Smashing the Stack for Fun and Profit","author":"one","year":"0","journal-title":"Phrack"},{"journal-title":"Stack Frames","year":"0","author":"krzyzanowski","key":"ref12"},{"year":"0","key":"ref13"},{"journal-title":"Programming in D","year":"0","author":"\u00e7ehreli","key":"ref14"},{"year":"0","key":"ref15"},{"journal-title":"Phrack","article-title":"Once upon a free","year":"0","key":"ref16"},{"key":"ref4","article-title":"Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software","author":"newsome","year":"2006","journal-title":"NDSS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2019.00026"},{"key":"ref5","article-title":"The Legitimate vulnerability market: the secretive world of 0-day exploit sales","author":"miller","year":"2007","journal-title":"WEIS"},{"key":"ref8","volume":"4","author":"clarke","year":"2009","journal-title":"Fuzzing for Software Vulnerability Discovery"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.002"},{"journal-title":"Enforcing Memory Safety in Cyber-Physical Systems","year":"0","author":"chekole","key":"ref2"},{"key":"ref1","article-title":"Memory Corruption-Basic Attacks and Counter Measures","author":"pal","year":"0","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00071"}],"event":{"name":"2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet)","start":{"date-parts":[[2021,11,4]]},"location":"Iasi, Romania","end":{"date-parts":[[2021,11,6]]}},"container-title":["2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9637709\/9637710\/09638292.pdf?arnumber=9638292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:39Z","timestamp":1652187279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9638292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/roedunet54112.2021.9638292","relation":{},"subject":[],"published":{"date-parts":[[2021,11,4]]}}}