{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:23:34Z","timestamp":1726471414922},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"Natural Scientific Research Innovation Foundation in Harbin Institute of Technology","award":["HIT.NSRIF.2014098"]},{"name":"Shenzhen Peacock Project, China","award":["KQC201109020055A"]},{"name":"Shenzhen Strategic Emerging Industries Program","award":["ZDSY20120613125016389"]},{"DOI":"10.13039\/501100001868","name":"National Science Council, Taiwan, ROC","doi-asserted-by":"publisher","award":["NSC 101-2221-E-007-026-MY3"],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards & Interfaces"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1016\/j.csi.2014.08.008","type":"journal-article","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T15:29:44Z","timestamp":1409153384000},"page":"17-24","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["An enhancement of return address stack for security"],"prefix":"10.1016","volume":"38","author":[{"given":"Chien-Ming","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shaui-Min","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei-Chih","family":"Ting","sequence":"additional","affiliation":[]},{"given":"Chi-Yi","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Hung-Min","family":"Sun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2014.08.008_bb0005","series-title":"Proceedings of the 13th Conference on USENIX Security Symposium","first-page":"45","article-title":"TIED, LibsafePlus: tools for runtime buffer overflow protection","author":"Avijit","year":"2004"},{"key":"10.1016\/j.csi.2014.08.008_bb0010","series-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference","first-page":"251","article-title":"Transparent run-time defense against stack smashing attacks","author":"Baratloo","year":"2000"},{"author":"Baratloo","key":"10.1016\/j.csi.2014.08.008_bb0015"},{"author":"Bulba","key":"10.1016\/j.csi.2014.08.008_bb0020"},{"key":"10.1016\/j.csi.2014.08.008_bb0025","first-page":"57","article-title":"SASHIMI: secure aggregation via successively hierarchical inspecting of message integrity on WSN","volume":"4","author":"Chen","year":"2013","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"10.1016\/j.csi.2014.08.008_bb0030","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/TIFS.2013.2270106","article-title":"A scalable transitive human-verifiable authentication protocol for mobile devices","volume":"8","author":"Chen","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.csi.2014.08.008_bb0035","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.csi.2012.02.002","article-title":"Improving network congestion: a RED-based fuzzyPID approach","volume":"34","author":"Chen","year":"2012","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.csi.2014.08.008_bb0040","series-title":"Proceedings of the 21th International Conference on Distributed Computing Systems","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/ICDSC.2001.918971","article-title":"RAD: a compile-time solution to buffer overflow attacks","author":"Chiueh","year":"2001"},{"key":"10.1016\/j.csi.2014.08.008_bb0045","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1055626.1055636","article-title":"Using DISE to protect return addresses from attack","author":"Corliss","year":"2005","journal-title":"SIGARCH Computer Architecture News"},{"key":"10.1016\/j.csi.2014.08.008_bb0050","series-title":"Proceedings of the 12th Conference on USENIX Security Symposium","first-page":"91","article-title":"Pointguard: protecting pointers from buffer overflow vulnerabilities","author":"Cowan","year":"2003"},{"key":"10.1016\/j.csi.2014.08.008_bb0055","series-title":"Proceedings of the 7th Conference on USENIX Security Symposium","first-page":"63","article-title":"StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"Cowan","year":"1998"},{"key":"10.1016\/j.csi.2014.08.008_bb0060","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.csi.2013.09.005","article-title":"A standard for developing secure mobile applications","volume":"36","author":"Dye","year":"2014","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.csi.2014.08.008_bb0065","series-title":"Proceedings of the 10th Conference on USENIX Security Symposium","first-page":"55","article-title":"StackGhost: hardware facilitated stack protection","author":"Frantzen","year":"2001"},{"key":"10.1016\/j.csi.2014.08.008_bb0070","first-page":"13","article-title":"A novel QKD network routing algorithm based on optical-path-switching","volume":"5","author":"Han","year":"2014","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"10.1016\/j.csi.2014.08.008_bb0075","series-title":"Proceedings of the 3rd Conference on USENIX Windows NT Symposium","first-page":"135","article-title":"Detours: binary interception of Win32 functions","author":"Hunt","year":"1999"},{"key":"10.1016\/j.csi.2014.08.008_bb0085","series-title":"Proceedings of the 21st Annual Computer Security Applications Conference","first-page":"286","article-title":"e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing","author":"Kc","year":"2005"},{"key":"10.1016\/j.csi.2014.08.008_bb0090","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.infsof.2009.10.004","article-title":"Filtering false alarms of buffer overflow analysis using SMT solvers","volume":"52","author":"Kim","year":"2010","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.csi.2014.08.008_bb0095","series-title":"Proceedings of the 10th Conference on USENIX Security Symposium","first-page":"177","article-title":"Statically detecting likely buffer overflow vulnerabilities","author":"Larochelle","year":"2001"},{"key":"10.1016\/j.csi.2014.08.008_bb0100","series-title":"Proceedings of the 11th Conference on USENIX Security Symposium","first-page":"81","article-title":"Type-assisted dynamic buffer overflow detection","author":"Lhee","year":"2002"},{"article-title":"LibsafeXP: a practical and transparent tool for run-time buffer overflow preventions","year":"2006","series-title":"Proceedings of the IEEE Workshop on Information Assurance","author":"Lin","key":"10.1016\/j.csi.2014.08.008_bb0105"},{"key":"10.1016\/j.csi.2014.08.008_bb0110","series-title":"Proceedings of the International Conference on Information Technology: Coding and, Computing","first-page":"656","article-title":"StackOFFence: a technique for defending against buffer overflow attacks","author":"Madan","year":"2005"},{"volume":"3","article-title":"Install-time vaccination of windows executables to defend against stack smashing attacks","year":"2006","author":"Nebenzahl","key":"10.1016\/j.csi.2014.08.008_bb0115"},{"key":"10.1016\/j.csi.2014.08.008_bb0125","series-title":"Proceedings of the 9th International Conference on Advanced Communication Technology","first-page":"1776","article-title":"The dynamic buffer overflow detection and prevention tool for windows executables using binary rewriting","author":"Park","year":"2007"},{"key":"10.1016\/j.csi.2014.08.008_bb0130","series-title":"Proceedings of the USENIX Annual Technical Conference","first-page":"211","article-title":"A binary rewriting defense against stack-based buffer overflow attacks","author":"Prasad","year":"2003"},{"author":"Richarte","key":"10.1016\/j.csi.2014.08.008_bb0135"},{"author":"Richarte","key":"10.1016\/j.csi.2014.08.008_bb0140"},{"key":"10.1016\/j.csi.2014.08.008_bb0145","series-title":"Proceedings of the IEEE Symposium on Security and Privacy","first-page":"74","article-title":"Secure coding in C and C++: of strings and integers","author":"Seacord","year":"2006"},{"key":"10.1016\/j.csi.2014.08.008_bb0150","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/TC.2011.46","article-title":"A native APIs protection mechanism in the kernel mode against malicious code","volume":"60","author":"Sun","year":"2011","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.csi.2014.08.008_bb0155","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1016\/j.csi.2013.12.008","article-title":"An extensible pattern-based library and taxonomy of security threats for distributed systems","volume":"36","author":"Uzunov","year":"2014","journal-title":"Comput. Standards Interfaces"},{"key":"10.1016\/j.csi.2014.08.008_bb0165","series-title":"Proceedings of the IEEE International Conference on Dependable Systems and, Networks","first-page":"25","article-title":"Intrusion prevention using control data randomization","author":"Xu","year":"2003"},{"key":"10.1016\/j.csi.2014.08.008_bb0170","series-title":"Proceedings of the Workshop on Evaluating and Architecting System Dependability","first-page":"51","article-title":"Architecture support for defending against buffer overflow attacks","author":"Xu","year":"2002"},{"key":"10.1016\/j.csi.2014.08.008_bb0175","series-title":"Proceedings of the Workshop on Architectural Support for Security and Anti-Virus","first-page":"73","article-title":"A reliable return address stack: microarchitectural features to defeat stack smashing","author":"Ye","year":"2005"}],"container-title":["Computer Standards & Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548914000865?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548914000865?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,30]],"date-time":"2018-09-30T03:54:07Z","timestamp":1538279647000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548914000865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":32,"alternative-id":["S0920548914000865"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2014.08.008","relation":{},"ISSN":["0920-5489"],"issn-type":[{"type":"print","value":"0920-5489"}],"subject":[],"published":{"date-parts":[[2015,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An enhancement of return address stack for security","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2014.08.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}