{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:34Z","timestamp":1750306714751,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T00:00:00Z","timestamp":1403827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MATINE"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,27]]},"DOI":"10.1145\/2659532.2659642","type":"proceedings-article","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T12:42:27Z","timestamp":1414500147000},"page":"286-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards a diversification framework for operating system protection"],"prefix":"10.1145","author":[{"given":"Sampsa","family":"Rauti","sequence":"first","affiliation":[{"name":"University of Turku"}]},{"given":"Johannes","family":"Holvitie","sequence":"additional","affiliation":[{"name":"University of Turku"}]},{"given":"Ville","family":"Lepp\u00e4nen","sequence":"additional","affiliation":[{"name":"University of Turku"}]}],"member":"320","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0162-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_7_1","first-page":"428","volume-title":"7th International Conference, ISC 2004","author":"Heffner K.","year":"2004","unstructured":"Heffner , K. , Collberg , C. S. : The obfuscation executive. In: Information Security , 7th International Conference, ISC 2004 . pp. 428 -- 440 , 2004 . Heffner, K., Collberg, C. S.: The obfuscation executive. In: Information Security, 7th International Conference, ISC 2004. pp. 428--440, 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"Franz","author":"Jackson T.","year":"2013","unstructured":"Jackson , T. , Homescu , A. , Crane , S. , Larsen , P. , Brunthaler , S. , Franz , M. : Diversifying the Software Stack Using Randomized NOP Insertion, Chapter 8 in {10}, 2013 . Jackson, T., Homescu, A., Crane, S., Larsen, P., Brunthaler, S., Franz, M.: Diversifying the Software Stack Using Randomized NOP Insertion, Chapter 8 in {10}, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security 54","author":"Jajodia S.","year":"2011","unstructured":"Jajodia , S. , Ghosh , A. K. , Swarup , V. , Wang , C. , Wang X. S.: Moving Target Defense , Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security 54 , Springer , 2011 . Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., Wang X. S.: Moving Target Defense, Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security 54, Springer, 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Information Security 100","author":"Jajodia S.","year":"2013","unstructured":"Jajodia , S. , Ghosh , A. K. , Subrahmanian , V. S. , Swarup , V. , Wang , C. , Wang X. S.: Moving Target Defense II, book , Advances in Information Security 100 , Springer , 2013 . Jajodia, S., Ghosh, A. K., Subrahmanian, V. S., Swarup, V., Wang, C., Wang X. S.: Moving Target Defense II, book, Advances in Information Security 100, Springer, 2013."},{"volume-title":"Taylor","author":"Kanter M.","key":"e_1_3_2_1_11_1","unstructured":"Kanter , M. , Taylor , S. : Attack Mitigation through Diversity , to appear in MILCOM 2013, Nov 2013. Kanter, M., Taylor, S.: Attack Mitigation through Diversity, to appear in MILCOM 2013, Nov 2013."},{"key":"e_1_3_2_1_13_1","first-page":"1093","volume-title":"An Application-Oriented Linux Kernel Customization for Embedded Systems. Journal of Information Science and Engineering 20","author":"Lee C.-T.","year":"2004","unstructured":"Lee , C.-T. , Lin , J.-M. , Hong , Z.-W. , Lee , W.-T. : An Application-Oriented Linux Kernel Customization for Embedded Systems. Journal of Information Science and Engineering 20 . pp. 1093 -- 1107 , 2004 . Lee, C.-T., Lin, J.-M., Hong, Z.-W., Lee, W.-T.: An Application-Oriented Linux Kernel Customization for Embedded Systems. Journal of Information Science and Engineering 20. pp. 1093--1107, 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"van Gundy","author":"Le Goues C.","year":"2013","unstructured":"Le Goues , C. , Nguyen-Tuong , A. , Chen H. , Davidson , J. W. , Forrest , S. , Hiser J. D. , Knight , J. C. , van Gundy , M. : Moving Target Defences in the Helix Self-Regenerative Architecture , in {10}, 2013 . Le Goues, C., Nguyen-Tuong, A., Chen H., Davidson, J. W., Forrest, S., Hiser J. D., Knight, J. C., van Gundy, M.: Moving Target Defences in the Helix Self-Regenerative Architecture, in {10}, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.240"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_3_2_1_17_1","volume-title":"V.: A Proxy-Like Obfuscator for Web Application Protection, International Journal on Information Technologies & Security, To appear","author":"Rauti S.","year":"2014","unstructured":"Rauti , S. , Lepp\u00e4nen , V.: A Proxy-Like Obfuscator for Web Application Protection, International Journal on Information Technologies & Security, To appear , 2014 Rauti, S., Lepp\u00e4nen, V.: A Proxy-Like Obfuscator for Web Application Protection, International Journal on Information Technologies & Security, To appear, 2014"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10211-5_17"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2383276.2383314"},{"key":"e_1_3_2_1_20_1","first-page":"469","volume-title":"Lepp\u00e4nen","author":"Rauti S.","year":"2014","unstructured":"Rauti , S. , Lepp\u00e4nen , V. : Man-in-the-Browser Attacks in Modern Web Browsers. Chapter 28 (pp. 469 -- 480 ), in book Emerging Trends in ICT Security (Babak Akhgar et al), Elsevier , 2014 . Rauti, S., Lepp\u00e4nen, V.: Man-in-the-Browser Attacks in Modern Web Browsers. Chapter 28 (pp. 469--480), in book Emerging Trends in ICT Security (Babak Akhgar et al), Elsevier, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Lepp\u00e4nen","author":"Rauti S.","year":"2013","unstructured":"Rauti , S. , Lepp\u00e4nen , V. : Resilient Code Protection by JavaScript and HTML Obfuscation for Ajax Applications against Man-in-the-Browser Attacks, Submitted to Journal of Information Security and Applications (Elsevier) , 46 pages, under evaluation, 2013 . Rauti, S., Lepp\u00e4nen, V.: Resilient Code Protection by JavaScript and HTML Obfuscation for Ajax Applications against Man-in-the-Browser Attacks, Submitted to Journal of Information Security and Applications (Elsevier), 46 pages, under evaluation, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.18"},{"key":"e_1_3_2_1_23_1","volume-title":": A Practical Guide to Linux","author":"Sobell M. G.","year":"1999","unstructured":"Sobell , M. G. : A Practical Guide to Linux , Addison-Wesley , 1999 . Sobell, M. G.: A Practical Guide to Linux, Addison-Wesley, 1999."},{"key":"e_1_3_2_1_24_1","volume-title":"Modern Operating System","author":"Tanenbaum A.","year":"2001","unstructured":"Tanenbaum , A. : Modern Operating System . Prentice Hall , 2001 . Tanenbaum, A.: Modern Operating System. Prentice Hall, 2001."},{"key":"e_1_3_2_1_25_1","volume-title":": Mastering Linux","author":"Wang S. P.","year":"2011","unstructured":"Wang , S. P. : Mastering Linux . CRC Press , 2011 . Wang, S. P.: Mastering Linux. CRC Press, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.18"}],"event":{"name":"CompSysTech'14: 15th International Conference on Computer Systems and Technologies","sponsor":["UORB University of Ruse, Bulgaria","Querbie Querbie"],"location":"Ruse Bulgaria","acronym":"CompSysTech'14"},"container-title":["Proceedings of the 15th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659532.2659642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659532.2659642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:21Z","timestamp":1750231161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659532.2659642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,27]]},"references-count":23,"alternative-id":["10.1145\/2659532.2659642","10.1145\/2659532"],"URL":"https:\/\/doi.org\/10.1145\/2659532.2659642","relation":{},"subject":[],"published":{"date-parts":[[2014,6,27]]},"assertion":[{"value":"2014-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}