{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:07:34Z","timestamp":1725520054557},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540892465"},{"type":"electronic","value":"9783540892472"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89247-2_1","type":"book-chapter","created":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T12:00:30Z","timestamp":1224244830000},"page":"1-20","source":"Crossref","is-referenced-by-count":31,"title":["A Smell of Orchids"],"prefix":"10.1007","author":[{"given":"Jean","family":"Goubault-Larrecq","sequence":"first","affiliation":[]},{"given":"Julien","family":"Olivain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Programming in Prolog","author":"W. Clocksin","year":"1981","unstructured":"Clocksin, W., Mellish, C.: Programming in Prolog. Springer, Heidelberg (1981)"},{"key":"1_CR2","volume-title":"The Temporal Logic of Reactive and Concurrent Systems","author":"Z. Manna","year":"1991","unstructured":"Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems. Springer, Heidelberg (1991)"},{"key":"1_CR3","unstructured":"McDonald, J., A.L. Digital Ltd., The Bunker: OpenSSL SSLv2 malformed client key remote buffer overflow vulnerability (July 2002), \n \n http:\/\/www.securityfocus.com\/bid\/5363"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-45248-5_6","volume-title":"Recent Advances in Intrusion Detection","author":"B. Morin","year":"2003","unstructured":"Morin, B., Debar, H.: Correlation of intrusion symptoms: An application of chronicles. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 94\u2013112. Springer, Heidelberg (2003)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"5th Intl. Symp. Recent Advances in Intrusion Detection (RAID 2002)","author":"B. Morin","year":"2002","unstructured":"Morin, B., M\u00e9, L., Debar, H., Ducass\u00e9, M.: M2D2: A formal data model for IDS alert correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516. Springer, Heidelberg (2002)"},{"key":"1_CR6","unstructured":"Olivain, J.: ORCHIDS\u2014real-time event analysis and temporal correlation for intrusion detection in information systems (2004), \n \n http:\/\/www.lsv.ens-cachan.fr\/orchids\/"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/11513988_28","volume-title":"Computer Aided Verification","author":"J. Olivain","year":"2005","unstructured":"Olivain, J., Goubault-Larrecq, J.: The Orchids intrusion detection tool. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 286\u2013290. Springer, Heidelberg (2005)"},{"key":"1_CR8","unstructured":"Olivain, J., Goubault-Larrecq, J.: Detecting subverted cryptographic protocols by entropy checking. Research Report LSV-06-13, Laboratoire Sp\u00e9cification et V\u00e9rification, ENS Cachan, France, 19. pages (June 2006)"},{"key":"1_CR9","first-page":"64","volume-title":"15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"J.-P. Pouzol","year":"2002","unstructured":"Pouzol, J.-P., Ducass\u00e9, M.: Formal specification of intrusion signatures and detection rules. In: Cervesato, I. (ed.) 15th IEEE Computer Security Foundations Workshop (CSFW 2002), pp. 64\u201376. IEEE Comp.Soc.Press, Los Alamitos (2002)"},{"key":"1_CR10","unstructured":"Purczy\u0144ski, W.: Linux ptrace\/execve race condition vulnerability. BugTraq Id 2529 (March 2001), \n \n http:\/\/www.securityfocus.com\/bid\/2529"},{"key":"1_CR11","unstructured":"Purczy\u0144ski, W.: Linux kernel privileged process hijacking vulnerability. BugTraq Id 7112 (March 2003), \n \n http:\/\/www.securityfocus.com\/bid\/7112"},{"key":"1_CR12","unstructured":"Purczy\u0144ski, W., qaaz.: Linux kernel prior to 2.6.24.2 \u2018vmsplice_to_pipe()\u2019 local privilege escalation vulnerability (February 2008), \n \n http:\/\/www.securityfocus.com\/bid\/27801"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/CSFW.2001.930148","volume-title":"14th IEEE Computer Security Foundations Workshop (CSFW 2001)","author":"M. Roger","year":"2001","unstructured":"Roger, M., Goubault-Larrecq, J.: Log auditing through model checking. In: 14th IEEE Computer Security Foundations Workshop (CSFW 2001), pp. 220\u2013236. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"1_CR14","unstructured":"Starzetz, P.: Linux kernel 2.4.22 do_brk() privilege escalation vulnerability, K-Otik ID 0446, CVE CAN-2003-0961 (December 2003), \n \n http:\/\/www.k-otik.net\/bugtraq\/12.02.kernel.2422.php"},{"key":"1_CR15","first-page":"209","volume-title":"Security and Protection in Information Processing Systems, IFIP 18th World Computer Congress, TC11 19th International Information Security Conference","author":"E. Totel","year":"2004","unstructured":"Totel, E., Vivinis, B., M\u00e9, L.: A language driven IDS for event and alert correlation. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems, IFIP 18th World Computer Congress, TC11 19th International Information Security Conference, pp. 209\u2013224. Kluwer, Dordrecht (2004)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89247-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T20:43:31Z","timestamp":1551645811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89247-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540892465","9783540892472"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89247-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}