{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:41:37Z","timestamp":1773841297001,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030004699","type":"print"},{"value":"9783030004705","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_5","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"92-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Backdoors: Definition, Deniability and Detection"],"prefix":"10.1007","author":[{"given":"Sam L.","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"5_CR1","unstructured":"An attempt to backdoor the kernel (2003). https:\/\/lwn.net\/Articles\/57135\/"},{"key":"5_CR2","unstructured":"From China with Love (2013). http:\/\/www.devttys0.com\/2013\/10\/from-china-with-love\/"},{"key":"5_CR3","unstructured":"How a Crypto \u2018Backdoor\u2019 Pitted the Tech World Against the NSA (2013). https:\/\/www.wired.com\/2013\/09\/nsa-backdoor\/"},{"key":"5_CR4","unstructured":"Multiple Vulnerabilities in D-Link DIR-600 and DIR-300 (rev B) (2013). http:\/\/www.s3cur1ty.de\/node\/672"},{"key":"5_CR5","unstructured":"Reverse Engineering a D-Link Backdoor (2013). http:\/\/www.devttys0.com\/2013\/10\/reverse-engineering-a-d-link-backdoor\/"},{"key":"5_CR6","unstructured":"TCP-32764 Backdoor (2013). https:\/\/github.com\/elvanderb\/TCP-32764"},{"key":"5_CR7","unstructured":"Why everyone is left less secure when the NSA doesn\u2019t help fix security flaws (2013). https:\/\/bit.ly\/2JJ9Zsg"},{"key":"5_CR8","unstructured":"Inside the EquationDrug Espionage Platform (2015). https:\/\/securelist.com\/inside-the-equationdrug-espionage-platform\/69203\/"},{"key":"5_CR9","unstructured":"Adups Backdoor (2016). https:\/\/www.kryptowire.com\/adups_security_analysis.html"},{"key":"5_CR10","unstructured":"Backdoor in Sony IPELA Engine IP Cameras (2016). https:\/\/sec-consult.com\/en\/blog\/2016\/12\/backdoor-in-sony-ipela-engine-ip-cameras\/"},{"key":"5_CR11","unstructured":"Multiple vulnerabilities found in Quanta LTE routers (2016). http:\/\/pierrekim.github.io\/blog\/2016-04-04-quanta-lte-routers-vulnerabilities.html"},{"key":"5_CR12","unstructured":"Netis Router Backdoor Update (2016). https:\/\/blog.trendmicro.com\/netis-router-backdoor-update\/"},{"key":"5_CR13","unstructured":"Hacking the Western Digital MyClound NAS (2017). https:\/\/blog.exploitee.rs\/2017\/hacking_wd_mycloud\/"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-08509-8_3","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"D Andriesse","year":"2014","unstructured":"Andriesse, D., Bos, H.: Instruction-level steganography for covert trigger-based malware. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 41\u201350. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08509-8_3"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Dullien, T.F.: Weird machines, exploitability, and provable unexploitability. IEEE Transactions on Emerging Topics in Computing Preprint (2017)","DOI":"10.1109\/TETC.2017.2785299"},{"key":"5_CR16","unstructured":"Oakley, J., Bratus, S.: Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code. In: 5th USENIX Conference on Offensive Technologies (2011)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Schuster, F., Holz, T.: Towards reducing the attack surface of software backdoors. In: 2013 ACM SIGSAC Conference on Computer & Communications Security (2013)","DOI":"10.1145\/2508859.2516716"},{"key":"5_CR18","unstructured":"Shapiro, R., Bratus, S., Smith, S.W.: \u201cWeird Machines\u201d in ELF: a spotlight on the underappreciated metadata. In: 7th USENIX Conference on Offensive Technologies (2013)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., Wang, R., Hauser, C., Kruegel, C., Vigna, G.: Firmalice - automatic detection of authentication bypass vulnerabilities in binary firmware. In: 2015 Network and Distributed System Security Symposium (2015)","DOI":"10.14722\/ndss.2015.23294"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Tan, S.J., Bratus, S., Goodspeed, T.: Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware. In: 30th Annual Computer Security Applications Conference (2014)","DOI":"10.1145\/2664243.2664268"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-66399-9_28","volume-title":"Computer Security \u2013 ESORICS 2017","author":"SL Thomas","year":"2017","unstructured":"Thomas, S.L., Chothia, T., Garcia, F.D.: Stringer: measuring the importance of static data comparisons to detect backdoors and undocumented functionality. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 513\u2013531. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_28"},{"key":"5_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_13","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"SL Thomas","year":"2017","unstructured":"Thomas, S.L., Garcia, F.D., Chothia, T.: HumIDIFy: a tool for hidden functionality detection in firmware. In: Polychronakis, M., Meier, M. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment. LNCS. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60876-1_13"},{"key":"5_CR23","unstructured":"Wysopal, C., Eng, C.: Static Detection of Application Backdoors. Black Hat USA (2007)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Zaddach, J., et al.: Implementation and implications of a stealth hard-drive backdoor. In: 29th Annual Computer Security Applications Conference (2013)","DOI":"10.1145\/2523649.2523661"},{"key":"5_CR25","unstructured":"Zhang, Y., Paxson, V.: Detecting backdoors. In: 9th USENIX Conference on Security Symposium (2000)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:37:29Z","timestamp":1571848649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}