{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:31:58Z","timestamp":1725550318419},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540295723"},{"type":"electronic","value":"9783540320920"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11572329_5","type":"book-chapter","created":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T13:09:38Z","timestamp":1129122578000},"page":"20-34","source":"Crossref","is-referenced-by-count":7,"title":["A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Dur\u00e3es","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"FrSIRT \u2013 French Security Incident Response Team, available online at, http:\/\/www.frsirt.com\/exploits\/ )"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Eichin, M., Rochlis, J.: With microscope and tweezers: An analysis of the internet virus of November 1988. In: Proceedings of the 1989 IEEE Computer Society Symposium on Security and Privacy (1989)","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"5_CR3","unstructured":"Microsoft Security Bulletin MS04-028, Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution, available at http:\/\/www.microsoft.com\/technet\/security\/bulletin\/MS04-028.mspx"},{"key":"5_CR4","unstructured":"Chiueh, T., Hsu, F.: RAD: A Compile Time Solution for Buffer Overflow Attacks. In: Proceedings of the 21st IEEE International Conference on Distributed Computing Systems, ICDCS (April 2001)"},{"key":"5_CR5","unstructured":"Cowan, C., et al.: StackGuard: Automatic Detection and Prevention of Buffer-overrun Attacks. In: Proceedings of the 7th USENIX Security Symposium (January 1998)"},{"key":"5_CR6","unstructured":"Larochelle, D., Evans, D.: Statically Detecting Likely Buffer Overflow Vulnerabilities. In: Proceedings of the 2001 USENIX Security Symposium, Washington, D C, August 13-17 (2001)"},{"key":"5_CR7","unstructured":"Baratloo, A., Singh, N., Tsai, T.: Transparent Run-Time Defense Against Stack Smashing Attacks. In: Proceedings of the 2000 USENIX Annual Technical Conference, San Diego, California, USA, June 18-23 (2000)"},{"key":"5_CR8","unstructured":"Ghosh, A., O\u2019Connor, T.: Analyzing Programs for Vulnerability to Buffer Overrun Attacks, Technical Report, Reliable Software Technologies (January 1998)"},{"key":"5_CR9","unstructured":"Joey (Nishad Herath): Advanced Windows NT Security, The Black Hat Briefings 2000, Singapore (April 2000)"},{"key":"5_CR10","unstructured":"Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium \u2013 NDSS (February 2005)"},{"key":"5_CR11","unstructured":"Christodorescu, M., Jha, S.: Static Analysis of Executables to Detect Malicious Patterns. In: Proceedings of the 12th USENIX Security Symposium (August 2003)"},{"key":"5_CR12","unstructured":"Gillette, T.: A Unique Examination of the Buffer Overflow Condition., MsC Thesis, College of Engineering of the Florida Institute of Technology (2002)"},{"key":"5_CR13","unstructured":"One, A.: Smashing the stack for fun and profit. Phrack Magazine, 14\u201349 (1998)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Dur\u00e3es, J., Madeira, H.: Emulation of Software Faults by Educated Mutations at Machine-Code Level. In: Proceedings of the Thirteenth IEEE International Symposium on Software Reliability Engineering, ISSRE 2002, Annapolis MD, USA (November 2002)","DOI":"10.1109\/ISSRE.2002.1173283"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Dur\u00e3es, J., Madeira, H.: Definition of Software Fault Emulation Operators: a Field Data Study. In: Proceedings of International Conference on Dependable Systems and Networks, DSN 2003, San Francisco (2003) (IEEE William Carter Award for the best student paper)","DOI":"10.1109\/DSN.2003.1209922"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Koopman, P., et al.: Comparing Operating Systems using Robustness Benchmarks. In: Proceedings of the 16th International Symposium on Reliable Distributed Systems, SRDS-16 (1997)","DOI":"10.1109\/RELDIS.1997.632800"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Fabre, J.C., Rodr\u00edguez, M., Arlat, J., Salles, F., Sizun, J.M.: Bulding Dependable COTS Microkernel-based Systems using MAFALDA. In: Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing, PRDC 2000, pp. 85\u201392 (2000)","DOI":"10.1109\/PRDC.2000.897288"},{"key":"5_CR18","unstructured":"Brown, A., Patterson, D.: Towards availability benchmark: a case study of software RAID systems. In: Proceedings of 2000 USENIX Annual Technical Conference, San Diego, California, USA, June 18-23, pp. 263\u2013276 (2000)"},{"key":"5_CR19","unstructured":"Kanoun, K., Arlat, J., Costa, D., Dal Cin, M., Gil, P., Laprie, J.-C., Madeira, H., Suri, N.: DBench: Dependability Benchmarking. In: Supplement of International Conference on Dependable Systems and Networks, DSN 2001, G\u00f6teborg, Sweden (2001)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Vieira, M., Madeira, H.: A Dependability Benchmark for OLTP Application Environments. In: 29th International Converence on Very Large Databases, VLDB 2003, Berlin, Germany, September 9-12 (2003)","DOI":"10.1016\/B978-012722442-8\/50071-9"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-30138-7_25","volume-title":"Computer Safety, Reliability, and Security","author":"J. Dur\u00e3es","year":"2004","unstructured":"Dur\u00e3es, J., Vieira, M., Madeira, H.: Dependability Benchmarking of Web-Servers. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol.\u00a03219, pp. 297\u2013310. Springer, Heidelberg (2004)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Raymond, E.: The Cathedral and the Bazaar (1998), available at http:\/\/tuxedo.org\/~esr\/writings\/cathedral-bazaar\/","DOI":"10.5210\/fm.v3i2.578"},{"key":"5_CR23","unstructured":"Anderson, R.: Security in Open versus Closed Systems \u2013 the dance of Boltzmann, coarse and moore. In: Proceedings of the Open Source Software Economics, Law and Policy, Toulouse, France, June 20-21 (2002), available at http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/users\/rja14\/toulouse.pdf"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11572329_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T07:59:48Z","timestamp":1586505588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11572329_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540295723","9783540320920"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11572329_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}