{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:32:53Z","timestamp":1730194373552,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/acsac.2007.40","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:30:38Z","timestamp":1209389438000},"page":"53-63","source":"Crossref","is-referenced-by-count":3,"title":["Improving Signature Testing through Dynamic Data Flow Analysis"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Kruegel","sequence":"first","affiliation":[]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"journal-title":"PCRE - Perl compatible regular expressions","year":"2005","author":"hazel","key":"ref10"},{"volume":"8","journal-title":"Phrack Magazine","article-title":"horizon, Defeating Sniffers and Intrusion Detection Systems","year":"1998","key":"ref11"},{"journal-title":"IBM Zurich Research Laboratory Thor","year":"2004","key":"ref12"},{"volume":"10","journal-title":"Using Attack Mutation to Test a High-End NIDS Information Security Bulletin","year":"2005","author":"jha","key":"ref13"},{"journal-title":"Proceedings of the AusCERT Asia Pacific Information Technology Security Conference","article-title":"Reverse Engineering of Network Signatures","year":"2005","author":"kruegel","key":"ref14"},{"journal-title":"ADMmutate Polymorphic Shellcode Engine","year":"0","author":"macaulay","key":"ref15"},{"journal-title":"THOR A tool to test intrusion detection systems by variations of attacks","year":"2002","author":"marty","key":"ref16"},{"journal-title":"Metasploit Project Metasploit","year":"2005","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254342"},{"journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","year":"2005","author":"newsome","key":"ref19"},{"journal-title":"RegExLib Regular Expression Library","year":"2005","author":"spencer","key":"ref28"},{"journal-title":"Testing Intrusion Detection Systems","year":"2006","author":"balzarotti","key":"ref4"},{"journal-title":"SecurityFocus Samba ‘call_trans2open’ Remote Buffer Overflow Vulnerability","year":"2005","key":"ref27"},{"journal-title":"Anzen nidsbench a network intrusion detection system test suite","year":"1999","key":"ref3"},{"journal-title":"USENIX Security Symposium","article-title":"Understanding Data Lifetime via Whole System Simulation","year":"2004","author":"chow","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030088"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/356914.356918"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"journal-title":"Technical Report Secure Networks","article-title":"Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection","year":"1998","author":"ptacek","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.9"},{"journal-title":"SideStep","year":"2005","author":"graham","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.10"},{"journal-title":"SecurityFocus Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability","year":"2002","key":"ref26"},{"journal-title":"SecurityFocus Avenger's News System Remote Command Execution Vulnerability","year":"2002","key":"ref25"}],"event":{"name":"Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)","start":{"date-parts":[[2007,12,10]]},"location":"Miami Beach, FL, USA","end":{"date-parts":[[2007,12,14]]}},"container-title":["Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4412959\/4412960\/04412976.pdf?arnumber=4412976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T10:22:57Z","timestamp":1489659777000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4412976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/acsac.2007.40","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}