{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T23:10:49Z","timestamp":1723072249566},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,12,3]]},"DOI":"10.1145\/1185347.1185370","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Scalable network-based buffer overflow attack detection"],"prefix":"10.1145","author":[{"given":"Fu-Hau","family":"Hsu","sequence":"first","affiliation":[{"name":"National Central University, Taiwan, R.O.C."}]},{"given":"Fanglu","family":"Guo","sequence":"additional","affiliation":[{"name":"Symantec Research Laboratory, Cupertino, CA"}]},{"given":"Tzi-cker","family":"Chiueh","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY"}]}],"member":"320","published-online":{"date-parts":[[2006,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ICDCS","author":"Pradhan Prashant","year":"2000","unstructured":"Prashant Pradhan , Tzi-cker Chiueh, Anindya Neogi , \" Aggregate TCP Congestion Control Using Multiple Network Probing ,\" ICDCS 2000 . Prashant Pradhan, Tzi-cker Chiueh, Anindya Neogi, \"Aggregate TCP Congestion Control Using Multiple Network Probing,\" ICDCS 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"Arizon USA","author":"Fu-Hau Hsu Chiueh","year":"2001","unstructured":"Tzi-cker Chiueh and Fu-Hau Hsu , \"RAD : A Compiler Time Solution to Buffer Overflow Attacks,\" Proceeding of ICDCS 2001 , Arizon USA , April 2001 Tzi-cker Chiueh and Fu-Hau Hsu, \"RAD: A Compiler Time Solution to Buffer Overflow Attacks,\" Proceeding of ICDCS 2001, Arizon USA, April 2001"},{"key":"e_1_3_2_1_3_1","volume-title":"San Antonio","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton , \" StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,\" in Proceedings of 7th USENIX Security Conference , San Antonio , Texas , Jan. 1998 C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, \"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,\" in Proceedings of 7th USENIX Security Conference, San Antonio, Texas, Jan. 1998"},{"key":"e_1_3_2_1_4_1","volume-title":"DC","author":"Bhatkar Sandeep","year":"2003","unstructured":"Sandeep Bhatkar , Daniel C. DuVarney , and R. Sekar , \" Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits,\" 12th USENIX Security Symposium, Washington , DC , August 2003 . Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar, \"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits,\" 12th USENIX Security Symposium, Washington, DC, August 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801825"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/300979.300988"},{"key":"e_1_3_2_1_8_1","unstructured":"Sandeep Grover \"Buffer Overflow Attacks and Their Countermeasures \" Linux Journal March 10 2003  Sandeep Grover \"Buffer Overflow Attacks and Their Countermeasures \" Linux Journal March 10 2003"},{"key":"e_1_3_2_1_9_1","unstructured":"Ethereal: A Network Protocol Analyzer www.ethereal.com  Ethereal: A Network Protocol Analyzer www.ethereal.com"},{"key":"e_1_3_2_1_10_1","unstructured":"FastTrack Description http:\/\/www.p2pwatchdog.com\/packet_fasttrack.html  FastTrack Description http:\/\/www.p2pwatchdog.com\/packet_fasttrack.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Usenix Annual Technical Conference, General Track","author":"Prasad Manish","year":"2003","unstructured":"Manish Prasad , Tzi-cker Chiueh, \" A Binary Rewriting Defense against Stack based Buffer Overflow Attacks ,\" Usenix Annual Technical Conference, General Track , San Antonio, TX , June 2003 Manish Prasad, Tzi-cker Chiueh, \"A Binary Rewriting Defense against Stack based Buffer Overflow Attacks,\" Usenix Annual Technical Conference, General Track, San Antonio, TX, June 2003"},{"key":"e_1_3_2_1_12_1","unstructured":"Fyodor \"Exploit world! Master Index for ALL Exploits \" http:\/\/www.insecure.org\/sploits_all.html  Fyodor \"Exploit world! Master Index for ALL Exploits \" http:\/\/www.insecure.org\/sploits_all.html"},{"key":"e_1_3_2_1_13_1","volume-title":"Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities,\" Network Operations and Management Symposium 2004(NOMS","author":"Pasupulati A.","year":"2004","unstructured":"A. Pasupulati , J. Coit , K. Levitt , S.F. Wu , S.H. Li , R.C. Kuo , and K.P. Fan , \" Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities,\" Network Operations and Management Symposium 2004(NOMS 2004 ). A. Pasupulati, J. Coit, K. Levitt, S.F. Wu, S.H. Li, R.C. Kuo, and K.P. Fan, \"Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities,\" Network Operations and Management Symposium 2004(NOMS 2004)."},{"key":"e_1_3_2_1_14_1","volume-title":"RAID","author":"Toth Thomas","year":"2002","unstructured":"Thomas Toth , Christopher Kruegel , \" Accurate Buffer Overflow Detection via Abstract Payload Execution ,\" Distributed Systems Group , Technical University Vienna, Austria , RAID 2002 . Thomas Toth, Christopher Kruegel, \"Accurate Buffer Overflow Detection via Abstract Payload Execution,\" Distributed Systems Group, Technical University Vienna, Austria, RAID 2002."},{"key":"e_1_3_2_1_15_1","volume-title":"AUSCERT 2004","author":"Andersson Stig","unstructured":"Stig Andersson , Andrew Clark , and George Mohay ,\" Network-Based Buffer Overflow Detection by Exploit Code Analysis ,\" AUSCERT 2004 Stig Andersson, Andrew Clark, and George Mohay,\" Network-Based Buffer Overflow Detection by Exploit Code Analysis,\" AUSCERT 2004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352624"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security Symposium","author":"Smart Matthew","year":"2000","unstructured":"Matthew Smart , G. Robert Malan , Farnam Jahanian , \" Defeating TCP\/IP Stack Fingerprinting ,\" USENIX Security Symposium , Aug. 2000 . Matthew Smart, G. Robert Malan, Farnam Jahanian, \"Defeating TCP\/IP Stack Fingerprinting,\" USENIX Security Symposium, Aug. 2000."},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium","author":"Handley Mark","year":"2001","unstructured":"Mark Handley , Vern Paxson , and Christian Kreibich , \" Network Intrusion Detection : Evasion, Traffic Normalization, and End-to-End Protocol Semantics,\" Proc . USENIX Security Symposium 2001 . Mark Handley, Vern Paxson, and Christian Kreibich, \"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics,\" Proc. USENIX Security Symposium 2001."},{"key":"e_1_3_2_1_19_1","unstructured":"Vendicator \"Stack Shield \" http:\/\/www.angelfire.com\/sk\/stackshield\/  Vendicator \"Stack Shield \" http:\/\/www.angelfire.com\/sk\/stackshield\/"},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","author":"Wagner David","year":"2000","unstructured":"David Wagner , Jeffrey S. Foster , Eric A. Brewer , and Alexander Aiken , \" A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities ,\" NDSS 2000 . David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken, \"A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities,\" NDSS 2000."},{"key":"e_1_3_2_1_21_1","unstructured":"CacheLogic http:\/\/www.cachelogic.com\/research\/slide1.php  CacheLogic http:\/\/www.cachelogic.com\/research\/slide1.php"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"e_1_3_2_1_23_1","volume-title":"Sept.","author":"Wang Ke","year":"2005","unstructured":"Ke Wang and S. J. Stolfo , \" Anomalous Payload-based Network Intrusion Detection,\"Recent Advance in Intrusion Detection (RAID) , Sept. 2005 . Ke Wang and S. J. Stolfo, \"Anomalous Payload-based Network Intrusion Detection,\"Recent Advance in Intrusion Detection (RAID), Sept. 2005."},{"key":"e_1_3_2_1_24_1","unstructured":"DilDog \"The Tao of Windows Buffer Overflow \" http:\/\/www.cultdeadcow.com\/cDc_files\/cDc-351\/index.html  DilDog \"The Tao of Windows Buffer Overflow \" http:\/\/www.cultdeadcow.com\/cDc_files\/cDc-351\/index.html"}],"event":{"name":"ANCS06: Symposium on Architecture for Networking and Communications Systems","location":"San Jose California USA","acronym":"ANCS06","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1185347.1185370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T14:16:16Z","timestamp":1673100976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185347.1185370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,3]]},"references-count":24,"alternative-id":["10.1145\/1185347.1185370","10.1145\/1185347"],"URL":"https:\/\/doi.org\/10.1145\/1185347.1185370","relation":{},"subject":[],"published":{"date-parts":[[2006,12,3]]},"assertion":[{"value":"2006-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}