{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:32Z","timestamp":1750307972078,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T00:00:00Z","timestamp":1193529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,28]]},"DOI":"10.1145\/1315245.1315314","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"562-572","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Memsherlock"],"prefix":"10.1145","author":[{"given":"Emre C.","family":"Sezer","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chongkyung","family":"Kil","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)","author":"Chen H.","year":"2004","unstructured":"H. Chen , D. Dean , and D. Wagner . Model checking one million lines of c code . In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS) , February 2004 . H. Chen, D. Dean, and D. Wagner. Model checking one million lines of c code. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), February 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586142"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 14th USENIX Security Symposium","author":"Chen S.","year":"2005","unstructured":"S. Chen , J. Xu , and E. C. Sezer . Non-control-data attacks are realistic threats . In Proceedings of 14th USENIX Security Symposium , 2005 . S. Chen, J. Xu, and E. C. Sezer. Non-control-data attacks are realistic threats. In Proceedings of 14th USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_5_1","unstructured":"CodeSurfer. http:\/\/www.grammatech.com\/products\/codesurfer\/.  CodeSurfer. http:\/\/www.grammatech.com\/products\/codesurfer\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102152"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301324"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS '06)","author":"James Newsome D. S.","year":"2006","unstructured":"D. S. James Newsome , David Brumley . Vulnerability-specific execution filtering for exploit prevention on commodity software . In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS '06) , Feb 2006 . D. S. James Newsome, David Brumley. Vulnerability-specific execution filtering for exploit prevention on commodity software. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS '06), Feb 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Kim H.","year":"2004","unstructured":"H. Kim and B. Karp . Autograph: Toward automated, distributed worm signature detection . In Proceedings of the 13th USENIX Security Symposium , August 2004 . H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In Proceedings of the 13th USENIX Security Symposium, August 2004."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II)","author":"Kreibich C.","year":"2003","unstructured":"C. Kreibich and J. Crowcroft . Honeycomb - creating intrusion detection signatures using honeypots . In Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II) , November 2003 . C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In Proceedings of the Second Workshop on Hot Topics in Networks (HotNets-II), November 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/161494.161501"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 10th USENIX Security Symposium","author":"Larochelle D.","year":"2001","unstructured":"D. Larochelle and D. Evans . Statically detecting likely buffer overflow vulnerabilities . In Proceedings of the 10th USENIX Security Symposium , August 2001 . D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In Proceedings of the 10th USENIX Security Symposium, August 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102150"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102150"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_19_1","volume-title":"Dynamic binary analysis and instrumentation","author":"Nethercote N.","year":"2004","unstructured":"N. Nethercote . Dynamic binary analysis and instrumentation , 2004 . valgrind.org\/docs\/phd2004.pdf. N. Nethercote. Dynamic binary analysis and instrumentation, 2004. valgrind.org\/docs\/phd2004.pdf."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05)","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05) , February 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005."},{"key":"e_1_3_2_1_21_1","unstructured":"PaX Team. http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX Team. http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_23_1","first-page":"149","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. Locasto , S. Boyd , and A. Keromytis . Building a reactive immune system for software services . In Proceedings of USENIX Annual Technical Conference , pages 149 -- 161 , April 2005 . S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. Building a reactive immune system for software services. In Proceedings of USENIX Annual Technical Conference, pages 149--161, April 2005."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI)","author":"Singh S.","year":"2004","unstructured":"S. Singh , C. Estan , G. Varghese , and S. Savage . Automated worm fingerprinting . In Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI) , December 2004 . S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI), December 2004."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05)","author":"Smirnov A.","year":"2005","unstructured":"A. Smirnov and T. Chiueh . DIRA: Automatic detection, identification, and repair of control-hijacking attacks . In Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05) , February 2005 . A. Smirnov and T. Chiueh. DIRA: Automatic detection, identification, and repair of control-hijacking attacks. In Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015489"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/RELDIS.2003.1238076","volume-title":"Proceedings of 22nd Symposium on Reliable Distributed Systems - SRDS 2003","author":"Xu J.","year":"2003","unstructured":"J. Xu , Z. Kalbarczyk , and R. K. Iyer . Transparent runtime randomization for security . In Proceedings of 22nd Symposium on Reliable Distributed Systems - SRDS 2003 , pages 260 -- 269 , 2003 . IEEE Computer Society, Oct. J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. In Proceedings of 22nd Symposium on Reliable Distributed Systems - SRDS 2003, pages 260--269, 2003. IEEE Computer Society, Oct."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102151"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/998680.1006720"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 14th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315314","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1315245.1315314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:21Z","timestamp":1750258701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315314"}},"subtitle":["an automated debugger for unknown memory corruption vulnerabilities"],"short-title":[],"issued":{"date-parts":[[2007,10,28]]},"references-count":31,"alternative-id":["10.1145\/1315245.1315314","10.1145\/1315245"],"URL":"https:\/\/doi.org\/10.1145\/1315245.1315314","relation":{},"subject":[],"published":{"date-parts":[[2007,10,28]]},"assertion":[{"value":"2007-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}