{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:43:00Z","timestamp":1725471780278},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_2","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T10:51:56Z","timestamp":1160563916000},"page":"12-21","source":"Crossref","is-referenced-by-count":9,"title":["TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation"],"prefix":"10.1007","author":[{"given":"Spiros","family":"Antonatos","sequence":"first","affiliation":[]},{"given":"Kostas G.","family":"Anagnostakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"CERT Advisory CA-2001-19: Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL (July 2001), http:\/\/www.cert.org\/advisories\/CA-2001-19.html"},{"key":"2_CR2","unstructured":"NLANR-PMA Traffic Archive: Bell Labs-I trace (2002), http:\/\/pma.nlanr.net\/Traces\/Traces\/long\/bell\/1"},{"key":"2_CR3","unstructured":"NLANR-PMA Traffic Archive: Leipzig-I trace (2002), http:\/\/pma.nlanr.net\/Traces\/Traces\/long\/leip\/1"},{"key":"2_CR4","unstructured":"The Spread of the Sapphire\/Slammer Worm (February 2003), http:\/\/www.silicondefense.com\/research\/worms\/slammer.php"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D., Li, D.: A Cooperative Immunization System for an Untrusting Internet. In: Proceedings of the 11th IEEE Internation Conference on Networking (ICON), September\/October 2003, pp. 403\u2013408 (2003)","DOI":"10.1109\/ICON.2003.1266224"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Antonatos, S., Akritidis, P., Markatos, E.P., Anagnostakis, K.G.: Defending against Hitlist Worms using Network Address Space Randomization. In: Proceedings of the 3rd ACM Workshop on Rapid Malcode (WORM) (November 2005)","DOI":"10.1145\/1103626.1103633"},{"key":"2_CR7","unstructured":"Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C.: Adaptive use of network-centric mechanisms in cyber-defense. In: Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing (May 2003)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Barrantes, E.G., Ackley, D.H., Palmer, T.S., Stefanovic, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (October 2003)","DOI":"10.1145\/948109.948147"},{"key":"2_CR9","unstructured":"Bhatkar, S., DuVarney, D., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, pp. 105\u2013120 (August 2003)"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/195792.195795","volume":"12","author":"J.S. Chase","year":"1994","unstructured":"Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and protection in a single-address-space operating system. ACM Transactions on Computer Systems\u00a012(4), 271\u2013307 (1994)","journal-title":"ACM Transactions on Computer Systems"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Droms, R.: Dynamic Host Configuration Protocol. RFC 2131 (March 1997), http:\/\/www.rfc-editor.org\/","DOI":"10.17487\/rfc2131"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering Code-Injection Attacks With Instruction-Set Randomization. In: Proceedings of the ACM Computer and Communications Security Conference (CCS), pp. 272\u2013280 (October 2003)","DOI":"10.1145\/948109.948146"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Kewley, D., Lowry, J., Fink, R., Dean, M.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX) (2001)","DOI":"10.1109\/DISCEX.2001.932214"},{"key":"2_CR15","unstructured":"Michalski, J., Price, C., Stanton, E., Chua, E.L., Seah, K., Heng, W.Y., Pheng, T.C.: Final Report for the Network Security Mechanisms Utilizing Network Address Translation LDRD Project. Technical Report SAND2002-3613, Sandia National Laboratories (November 2002)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Brown, J.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd Internet Measurement Workshop (IMW), pp. 273\u2013284 (November 2002)","DOI":"10.1145\/637201.637244"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Nojiri, D., Rowe, J., Levitt, K.: Cooperative response strategies for large scale attack mitigation. In: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX) (April 2003)","DOI":"10.1109\/DISCEX.2003.1194893"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2004","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 59\u201381. Springer, Heidelberg (2004)"},{"key":"2_CR19","first-page":"298","volume-title":"CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"H. Shacham","year":"2004","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.-J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307. ACM Press, New York (2004)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Sidiroglou, S., Keromytis, A.D.: A Network Worm Vaccine Architecture. In: Proceedings of the IEEE Workshop on Enterprise Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, pp. 220\u2013225 (June 2003)","DOI":"10.1109\/ENABL.2003.1231411"},{"key":"2_CR21","unstructured":"Staniford, S.: Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security (2004)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: Proc. ACM CCS WORM (October 2004)","DOI":"10.1145\/1029618.1029624"},{"key":"2_CR23","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium, pp. 149\u2013167 (August 2002)"},{"key":"2_CR24","unstructured":"Weaver, N., Paxson, V.: A worst-case worm. In: Proc. Third Annual Workshop on Economics and Information Security (WEIS 2004) (May 2004)"},{"key":"2_CR25","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very Fast Containment of Scanning Worms. In: Proceedings of the 13 th USENIX Security Symposium, pp. 29\u201344 (August 2004)"},{"key":"2_CR26","unstructured":"Williamson, M.: Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. Technical Report HPL-2002-172, HP Laboratories Bristol (2002)"},{"key":"2_CR27","unstructured":"Wu, J., Vangala, S., Gao, L., Kwiat, K.: An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 143\u2013156 (February 2004)"},{"key":"2_CR28","unstructured":"Xu, J., Kalbarczyk, Z., Iyer, R.: Transparent runtime randomization for security. In: Fantechi, A. (ed.) Proc. 22nd Symp. on Reliable Distributed Systems \u2013SRDS 2003, pp. 260\u2013269 (October 2003)"},{"key":"2_CR29","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global Intrusion Detection in the DOMINO Overlay System. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (February 2004)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and Early Warning for Internet Worms. In: Proceedings of the 10 th ACM International Conference on Computer and Communications Security (CCS), pp. 190\u2013199 (October 2003)","DOI":"10.1145\/948109.948136"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T12:36:10Z","timestamp":1555850170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11909033_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}