{"id":"https://openalex.org/W2163762767","doi":"https://doi.org/10.1145/1015467.1015489","title":"Shield","display_name":"Shield","publication_year":2004,"publication_date":"2004-08-30","ids":{"openalex":"https://openalex.org/W2163762767","doi":"https://doi.org/10.1145/1015467.1015489","mag":"2163762767"},"language":"en","primary_location":{"id":"doi:10.1145/1015467.1015489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1015467.1015489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072397167","display_name":"Helen J. Wang","orcid":"https://orcid.org/0000-0003-1237-9831"},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Helen J. Wang","raw_affiliation_strings":["Microsoft Research"],"affiliations":[{"raw_affiliation_string":"Microsoft Research","institution_ids":["https://openalex.org/I4210164937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054205326","display_name":"Chuanxiong Guo","orcid":"https://orcid.org/0000-0002-0730-8468"},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chuanxiong Guo","raw_affiliation_strings":["Microsoft Research"],"affiliations":[{"raw_affiliation_string":"Microsoft Research","institution_ids":["https://openalex.org/I4210164937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111393026","display_name":"Daniel Sim\u00f3n","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Daniel R. Simon","raw_affiliation_strings":["Microsoft Research"],"affiliations":[{"raw_affiliation_string":"Microsoft Research","institution_ids":["https://openalex.org/I4210164937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012131160","display_name":"Alf Zugenmaier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alf Zugenmaier","raw_affiliation_strings":["Microsoft Research"],"affiliations":[{"raw_affiliation_string":"Microsoft Research","institution_ids":["https://openalex.org/I4210164937"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072397167"],"corresponding_institution_ids":["https://openalex.org/I4210164937"],"apc_list":null,"apc_paid":null,"fwci":27.9987,"has_fulltext":false,"cited_by_count":263,"citation_normalized_percentile":{"value":0.99663089,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"193","last_page":"204"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4766308069229126}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4766308069229126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1015467.1015489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1015467.1015489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W14729615","https://openalex.org/W88684474","https://openalex.org/W88694106","https://openalex.org/W109616308","https://openalex.org/W132371169","https://openalex.org/W1490025813","https://openalex.org/W1498585374","https://openalex.org/W1514368868","https://openalex.org/W1516506771","https://openalex.org/W1518067596","https://openalex.org/W1526953979","https://openalex.org/W1540548505","https://openalex.org/W1553177637","https://openalex.org/W1557583788","https://openalex.org/W1560139368","https://openalex.org/W1579850852","https://openalex.org/W1655226010","https://openalex.org/W1682505673","https://openalex.org/W1779735989","https://openalex.org/W1781758015","https://openalex.org/W1836378862","https://openalex.org/W1966867318","https://openalex.org/W1979820341","https://openalex.org/W2031006315","https://openalex.org/W2033811087","https://openalex.org/W2035945487","https://openalex.org/W2083477206","https://openalex.org/W2084974764","https://openalex.org/W2099040451","https://openalex.org/W2103315222","https://openalex.org/W2109471749","https://openalex.org/W2109914336","https://openalex.org/W2123531272","https://openalex.org/W2134006599","https://openalex.org/W2149827273","https://openalex.org/W2155300758","https://openalex.org/W2158979531","https://openalex.org/W2159919478","https://openalex.org/W2168056538","https://openalex.org/W2172024521","https://openalex.org/W2914982603","https://openalex.org/W4206046171","https://openalex.org/W4232537713","https://openalex.org/W4285719527","https://openalex.org/W6603608667","https://openalex.org/W6632516326","https://openalex.org/W6637957265","https://openalex.org/W7066491068"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Software":[0],"patching":[1],"has":[2,181],"not":[3],"been":[4,19,28,182],"effective":[5],"as":[6,168],"a":[7,52,72,78,145,160,211,227],"first-line":[8,53],"defense":[9,55],"against":[10],"large-scale":[11],"worm":[12,54],"attacks,":[13],"even":[14],"when":[15],"patches":[16,36],"have":[17,27,158],"long":[18],"available":[20],"for":[21,110],"their":[22,32],"corresponding":[23],"vulnerabilities.":[24,98],"Generally,":[25],"people":[26],"reluctant":[29],"to":[30,39,44,103,108,126,165,223],"patch":[31,79],"systems":[33,70],"immediately,":[34],"because":[35],"are":[37,100,124],"perceived":[38],"be":[40,221],"unreliable":[41],"and":[42,93,105,114,162,202],"disruptive":[43,102],"apply.":[45],"To":[46],"address":[47],"this":[48,134,139],"problem,":[49],"we":[50,136],"propose":[51],"in":[56,68],"the":[57,85,154,173,179,186,231],"network":[58,65],"stack,":[59],"using":[60],"shields":[61,123],"--":[62],"vulnerability-specific,":[63],"exploit-generic":[64],"filters":[66,83,151],"installed":[67],"end":[69],"once":[71],"vulnerability":[73],"is":[74,80,141],"discovered,":[75],"but":[76],"before":[77],"applied.":[81],"These":[82],"examine":[84],"incoming":[86],"or":[87,128],"outgoing":[88],"traffic":[89,95,152],"of":[90,131,172,178,188,196,210,214,226,230],"vulnerable":[91,174],"applications,":[92],"correct":[94],"that":[96,138,150,218],"exploits":[97,132],"Shields":[99],"less":[101],"install":[104],"uninstall,":[106],"easier":[107],"test":[109],"bad":[111],"side":[112],"effects,":[113],"hence":[115],"more":[116],"reliable":[117],"than":[118],"traditional":[119],"software":[120],"patches.":[121],"Further,":[122],"resilient":[125],"polymorphic":[127],"metamorphic":[129],"variations":[130],"[43].In":[133],"paper,":[135],"show":[137],"concept":[140],"feasible":[142],"by":[143,184],"describing":[144],"prototype":[146],"Shield":[147,219],"framework":[148],"implementation":[149],"above":[153],"transport":[155],"layer.":[156],"We":[157],"designed":[159],"safe":[161],"restrictive":[163],"language":[164,180],"describe":[166],"vulnerabilities":[167,216],"partial":[169],"state":[170],"machines":[171],"application.":[175],"The":[176],"expressiveness":[177],"verified":[183],"encoding":[185],"signatures":[187],"several":[189],"known":[190,215],"vulnerabilites.":[191],"Our":[192],"evaluation":[193],"provides":[194],"evidence":[195],"Shield's":[197],"low":[198],"false":[199],"positive":[200],"rate":[201],"small":[203],"impact":[204],"on":[205],"application":[206],"throughput.":[207],"An":[208],"examination":[209],"sample":[212],"set":[213],"suggests":[217],"could":[220],"used":[222],"prevent":[224],"exploitation":[225],"substantial":[228],"fraction":[229],"most":[232],"dangerous":[233],"ones.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":13}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2016-06-24T00:00:00"}
