{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:31Z","timestamp":1771699831462,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":15,"publisher":"Springer New York","isbn-type":[{"value":"9781461409762","type":"print"},{"value":"9781461409779","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4614-0977-9_5","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T16:24:22Z","timestamp":1313771062000},"page":"99-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Symbiotes and defensive Mutualism: Moving Target Defense"],"prefix":"10.1007","author":[{"given":"Ang","family":"Cui","sequence":"first","affiliation":[]},{"given":"Salvatore J.","family":"Stolfo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"5_CR1_5","unstructured":"Microsoft Corporation, Kernel Patch Protection: Frequently Asked Questions. http:\/\/tinyurl.com\/y7pss5y, 2006."},{"key":"5_CR2_5","doi-asserted-by":"crossref","unstructured":"Hoi Chang and Mikhail J. Atallah. Protecting software code by guards. In Tomas Sander, editor, Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, pages 160\u2013175. Springer, 2001.","DOI":"10.1007\/3-540-47870-1_10"},{"key":"5_CR3_5","unstructured":"U\u00b4 lfar Erlingsson, Mart\u00b4\u0131n Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. Xfi: Software guards for system address spaces. In OSDI, pages 75\u201388. USENIX Association, 2006."},{"key":"5_CR4_5","doi-asserted-by":"crossref","unstructured":"Ligati et al. Enforcing security policies with run-time program monitors. Princeton University, 2005.","DOI":"10.1007\/11555827_21"},{"key":"5_CR5_5","doi-asserted-by":"crossref","unstructured":"Christopher Kr\u00a8ugel,William K. Robertson, and Giovanni Vigna. Detecting kernel-level rootkits through binary analysis. In ACSAC, pages 91\u2013100. IEEE Computer Society, 2004.","DOI":"10.1109\/CSAC.2004.19"},{"key":"5_CR6_5","unstructured":"Felix \u201dFX\u201d Linder. Cisco IOS Router Exploitation. In In BlackHat USA, 2009."},{"key":"5_CR7_5","doi-asserted-by":"crossref","unstructured":"Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors. Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15\u201317, 2008. Proceedings, volume 5230 of Lecture Notes in Computer Science. Springer, 2008.","DOI":"10.1007\/978-3-540-87403-4"},{"key":"5_CR8_5","unstructured":"Michael Lynn. Cisco IOS Shellcode, 2005. In BlackHat USA."},{"key":"5_CR9_5","unstructured":"Sebastian Muniz. Killing the myth of Cisco IOS rootkits: DIK, 2008. In EUSecWest."},{"key":"5_CR10_5","doi-asserted-by":"crossref","unstructured":"Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Lippmann et al. [7], pages 1\u201320.","DOI":"10.1007\/978-3-540-87403-4_1"},{"key":"5_CR11_5","unstructured":"Dror-John Roecher and Michael Thumann. NAC Attack. In In BlackHat USA, 2007."},{"key":"5_CR12_5","unstructured":"Skywing. Subverting PatchGuard Version 2, 2008. Uninformed,Volume 6."},{"key":"5_CR13_5","unstructured":"Yingbo Song, Pratap V. Prahbu, and Salvatore J. Stolfo. Smashing the stack with hydra: The many heads of advanced shellcode polymorphism. In Defcon 17, 2009."},{"key":"5_CR14_5","doi-asserted-by":"crossref","unstructured":"Vikas R. Vasisht and Hsien-Hsin S. Lee. Shark: Architectural support for autonomic protection against stealth by rootkit exploits. In MICRO, pages 106\u2013116. IEEE Computer Society, 2008.","DOI":"10.1109\/MICRO.2008.4771783"},{"key":"5_CR15_5","doi-asserted-by":"crossref","unstructured":"Zhi Wang, Xuxian Jiang, Weidong Cui, and Xinyuan Wang. Countering persistent kernel rootkits through systematic hook discovery. In Lippmann et al. [7], pages 21\u201338.","DOI":"10.1007\/978-3-540-87403-4_2"}],"container-title":["Advances in Information Security","Moving Target Defense"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-0977-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T23:21:32Z","timestamp":1741476092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-0977-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781461409762","9781461409779"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_5","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"5 August 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}