{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:02:21Z","timestamp":1725660141354},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/dsn.2013.6575319","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T16:18:36Z","timestamp":1376497116000},"page":"1-2","source":"Crossref","is-referenced-by-count":0,"title":["The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013"],"prefix":"10.1109","author":[{"given":"Jogesh K.","family":"Muppala","sequence":"first","affiliation":[]},{"given":"Matti","family":"Hiltunen","sequence":"additional","affiliation":[]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Verissimo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"70","article-title":"Using likely program invariants to detect hardware errors","author":"adve","year":"2008","journal-title":"Proceedings of IEEE Int Conf on Dependable Systems and Networks"},{"key":"35","first-page":"5","article-title":"Stack-Guard: Automatic adaptive detection and prevention of bufferoverflow attacks","author":"cowan","year":"1998","journal-title":"Seventh USENIX Security Symp Proc"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2007.4336201"},{"key":"36","first-page":"409","article-title":"RAD: A compile-time solution to buffer overflow attacks","author":"chiueh","year":"2001","journal-title":"Proc of the 21st IEEE Int'l Conf on Distr Computing Systems"},{"key":"18","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74320-0_4","article-title":"Swaddler: An approach for the anomaly-based detection of state violations in web applications","author":"cova","year":"2007","journal-title":"Proc of the 10th Int'l Conf on Recent Advances in Intrusion Detection"},{"year":"0","key":"33"},{"key":"15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/581376.581377","article-title":"Tracking Down Software Bugs using Automatic Anomaly Detection","author":"sudheendra hangal","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"34","first-page":"169","article-title":"NOZZLE: A defense against heap-spraying code injection attacks","author":"ratanaworabhan","year":"2009","journal-title":"Proc 10th Usenix Security Symp"},{"key":"16","first-page":"269","article-title":"AccMon: Automatically detecting memoryrelated bugs via program counter-based invariants","author":"zhou","year":"2004","journal-title":"Proc of the 37th Annual IEEE\/ACM Int'l Symp on Microarchitecture"},{"key":"39","first-page":"156","article-title":"ValueGuard: Protection of native applications against data-only buffer overflows","author":"van acker","year":"2010","journal-title":"Proc of the Sixth Int'l Conf on Inf Systems Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"14","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/302405.302467","article-title":"dynamically discovering likely program invariants to support program evolution","author":"ernst","year":"1999","journal-title":"Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat No 99CB37002) ICSE"},{"key":"37","first-page":"429","article-title":"Extended protection against stack smashing attacks without performance loss","author":"younan","year":"2006","journal-title":"Proc of the 22nd Annual Computer Security Appl Conf"},{"key":"11","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-642-00199-4_14","article-title":"MEDS: The memory error detection system","author":"hiser","year":"2009","journal-title":"Proc of the First Int'l Symp on Engineering Secure Software and Systems"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966465"},{"key":"21","article-title":"Using generalization and characterization techniques in the anomaly-based detection of web attacks","author":"robertson","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.19"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378538"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.07.011"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451147"},{"key":"40","first-page":"4","article-title":"TIED, LibsafePlus: Tools for runtime buffer overflow protection","author":"avijit","year":"2004","journal-title":"Proc of the 13th USENIX Security Symp"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048090"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2008.136"},{"key":"22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-74320-0_1","article-title":"Exploiting execution context for the detection of anomalous system calls","author":"mutz","year":"2007","journal-title":"Proc of the 10th Int'l Conf on Recent Advances in Intrusion Detection"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"24","first-page":"12","article-title":"Cling: A memory allocator to mitigate dangling pointers","author":"akritidis","year":"2010","journal-title":"Proc Usenix Security Symp"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/582420.582421"},{"key":"26","first-page":"51","article-title":"Runtime detection of heap-based overflows","author":"robertson","year":"2003","journal-title":"Proc USENIX 14th Syst Admin Conf"},{"key":"27","first-page":"206","article-title":"A scalable lockfree stack algorithm","author":"hendler","year":"2004","journal-title":"Proc 16th ACM Symp Parallelism in Algorithms and Architectures"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640101"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"3","first-page":"51","article-title":"Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors","author":"akritidis","year":"2009","journal-title":"Proc 10th Usenix Security Symp"},{"journal-title":"Mid-Year Trend and Risk Report","year":"2012","key":"2"},{"key":"10","first-page":"159","article-title":"A practical dynamic buffer overflow detector","author":"rowase","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"National Vulnerability Database","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993541"},{"key":"7","first-page":"147","article-title":"Securing software by enforcing data-flow integrity","author":"castro","year":"2006","journal-title":"Proc of the Seventh USENIX Symp on Oper Systems Design and Impl"},{"key":"6","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/1755688.1755707","article-title":"PAriCheck: An efficient pointer arithmetic checker for C programs","author":"younan","year":"2010","journal-title":"Proc ACM Symp Inf Comput Commun Security"},{"year":"0","key":"32"},{"key":"5","first-page":"17","article-title":"Efficient techniques for comprehensive protection from memory error exploits","author":"bhatkar","year":"2005","journal-title":"Proc of the 14th USENIX Security Symp"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321673"}],"event":{"name":"2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2013,6,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,6,27]]}},"container-title":["2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6569391\/6575287\/06575319.pdf?arnumber=6575319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T21:27:34Z","timestamp":1688419654000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6575319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/dsn.2013.6575319","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}