{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:54:26Z","timestamp":1725472466996},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540496083"},{"type":"electronic","value":"9783540496106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11937807_19","type":"book-chapter","created":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T13:56:48Z","timestamp":1162994208000},"page":"238-252","source":"Crossref","is-referenced-by-count":1,"title":["Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks"],"prefix":"10.1007","author":[{"given":"Deok Jin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Tae Hyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung Je","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Cert: Cert coordination center (2006), http:\/\/www.cert.org\/"},{"key":"19_CR2","unstructured":"Bugtraq: Bugtraq mailing list (2006), http:\/\/www.securityfocus.com\/archive\/1"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., Stefanovic, D., Zovi, D.D.: Intrusion detection: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (2003)","DOI":"10.1145\/948143.948147"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Proceedings of 10th ACM International Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948146"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Seward, J., Nethercote, N.: Valgrind: A program supervision framework. Electronic Notes in Theoretical Computer Science (2003)","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"19_CR6","unstructured":"Nergal: The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine 58(4) (2001), http:\/\/www.phrack.org\/phrack\/58\/p58-0x04"},{"key":"19_CR7","unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: Stackguard: Automatic adaptive detection and prevention of buffer overflow attacks. In: Proceedings of 7th USENIX Security Conference (1998)"},{"key":"19_CR8","unstructured":"Vendicator: Stackshield: A stack smashing technique protection tool for linux (2000), http:\/\/www.angelfire.com\/sk\/stackshield"},{"key":"19_CR9","unstructured":"Bulba, Kil3r: Bypassing stackguard and stackshield. Phrack Magazine 56(5) (2000), http:\/\/www.phrack.org\/phrack\/56\/p56-0x05"},{"key":"19_CR10","unstructured":"Designer, S.: Openwall project, non-executable user stack (2005), http:\/\/www.openwall.com\/linux"},{"key":"19_CR11","unstructured":"Team, P.: Pax aslr (address space layout randomization) (2003), http:\/\/pax.grsecurity.net\/"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: 11th ACM Conference on Computer and Communications Security (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"19_CR13","unstructured":"Johnson, S.C.: Lint: a c program checker. Bell Laboratories Computer Science Technical Report 65 (1977)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Evans, D., Larochelle, D.: Improving security using extensible lightweight static analysis. IEEE Software magazine (2002), http:\/\/www.splint.org\/","DOI":"10.1109\/52.976940"},{"key":"19_CR15","unstructured":"Jones, R.: Bounds checking patches for gcc (2005), http:\/\/sourceforge.net\/projects\/boundschecking\/"},{"key":"19_CR16","unstructured":"Baratloo, A., Tsai, T., Singh, N.: Libsafe: Protecting critical elements of stacks (1999), http:\/\/www.research.avayalabs.com\/project\/libsafe\/"},{"key":"19_CR17","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (2005)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Barrantes, E.G., Ackley, D.H., Forrest, S., Stefanovic, D.: Randomized instruction set emulation. ACM Transactions on Information and System Security (2005)","DOI":"10.1145\/1053283.1053286"},{"key":"19_CR19","unstructured":"Team, P.: Pax noexec (2003), http:\/\/pax.grsecurity.net\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11937807_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:48:37Z","timestamp":1619509717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11937807_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540496083","9783540496106"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11937807_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}