{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:44:14Z","timestamp":1649187854736},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2006,8,1]],"date-time":"2006-08-01T00:00:00Z","timestamp":1154390400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1007\/s11623-006-0255-6","type":"journal-article","created":{"date-parts":[[2007,10,18]],"date-time":"2007-10-18T07:48:32Z","timestamp":1192693712000},"page":"471-475","source":"Crossref","is-referenced-by-count":0,"title":["Windows Rootkits \u2014 eine aktuelle Bedrohung"],"prefix":"10.1007","volume":"30","author":[{"given":"Wilhelm","family":"Dolle","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Wegener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"255_CR1","unstructured":"Black_Tie_Affair, Hiding Out Under Unix, Phrack Magazine, Issue 25, File 6, http:\/\/www.phrack.org\/phrack\/25\/P25-06 , M\u00e4rz 1989"},{"key":"255_CR2","unstructured":"Butler, J., Sparks, S., Windows rootkits of 2005, part one, http:\/\/www.securityfocus.com\/infocus\/1850 , November 2005"},{"key":"255_CR3","unstructured":"Butler, J., Sparks, S., Windows rootkits of 2005, part two, http:\/\/www.securityfocus.com\/infocus\/1851 , November 2005"},{"key":"255_CR4","unstructured":"CERT\/CC, CERT Advisory CA-94-01 Ongoing Network Monitoring Attacks, http:\/\/www.cert.org\/advisories\/CA-1994-01.html , Februar 1994"},{"key":"255_CR5","unstructured":"CERT\/CC, CERT Advisory CA-95-18 Widespread Attacks on Internet Sites, http:\/\/www.cert.org\/advisories\/CA-1995-18.html , Dezember 1995"},{"key":"255_CR6","unstructured":"Dolle, W., Fritzinger, T., Schmidt, J., Heimliche Hintert\u00fcren \u2014 Rootkits aufsp\u00fcren und beseitigen, Artikel auf Heise Security, http:\/\/www.heise.de\/security\/artikel\/38057 , Juni 2003"},{"key":"255_CR7","unstructured":"fuzen_op, FU rootkit, Projekt Home Page bei www.rootkit.com, http:\/\/www.rootkit.com\/project.php?id=12 , Juli 2004"},{"key":"255_CR8","unstructured":"Hoglund, G., Butler, J., Rootkits \u2014 den Windows-Kernel unterwandern, Addison-Wesley-Verlag 2005, ISBN 3-8273-2341-X"},{"key":"255_CR9","unstructured":"Hoglund, G., A *REAL* NT Rootkit, patching the NT Kernel, Phrack Magazine, Issue 55, File 5, http:\/\/www.phrack.org\/phrack\/55\/P55-05 , September 1999"},{"key":"255_CR10","unstructured":"Holy_Father, Hacker defender 1.0.0 revisited, http:\/\/hxdef.org , November 2005"},{"key":"255_CR11","doi-asserted-by":"crossref","unstructured":"King, S. T., et al, SubVirt: Implementing malware with virtual machines, Proceedings of the 2006 IEEE Symposium on Security and Privacy, http:\/\/www.eecs.umich.edu\/Rio\/papers\/king06.pdf , Mai 2006","DOI":"10.1109\/SP.2006.38"},{"key":"255_CR12","unstructured":"K\u00fchnhauser, W. E., Rootkits, Dud 4\/2003"},{"key":"255_CR13","unstructured":"McAfee AVERT Technical White Papers, Rootkits, Part of 3: The Growing Threat, http:\/\/download.nai.com\/products\/mcafee-avert\/WhitePapers\/AKapoorRootkits1.pdf , April 2006"},{"key":"255_CR14","unstructured":"Norton, Q., Sony Numbers Add Up to Trouble, Wired News, http:\/\/www.wired.com\/news\/privacy\/0,1848,69573,00.html , November 2005"},{"key":"255_CR15","unstructured":"OSR Online, DeviceTree V2.18, http:\/\/www.osronline.com\/article.cfm?article=97 , Oktober 2005"},{"key":"255_CR16","unstructured":"Russinovich, M., Sony, Rootkits and Digital Rights Management Gone Too Far, http:\/\/www.sysinternals.com\/blog\/2005\/10\/sony-rootkits- and-digital-rights.html , Oktober 2005"},{"key":"255_CR17","unstructured":"Rutkowska, J., Concepts for the Stealth Windows Rootkit (The Chameleon Project), http:\/\/www.invisiblethings.org\/papers\/chameleon_concepts.pdf , September 2003"},{"key":"255_CR18","unstructured":"Sparks, S., Butler, J., Shadow Walker \u2014 Raising The Bar For Windows Rootkit Detection, Phrack Magazine, Issue 63, File 8, http:\/\/www.phrack.org\/phrack\/63\/p63-0x08_Raising_The_Bar_For_Windows_Rootkit_Detection.txt , August 2005"},{"key":"255_CR19","unstructured":"Symantec Security Advisory, Symantec Norton Protected Recycle Bin Exposure, http:\/\/securityresponse.symantec.com\/avcenter\/security\/Content\/2006.01.10.html , Januar 2006"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0255-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0255-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0255-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:21Z","timestamp":1559412501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0255-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2006,8]]}},"alternative-id":["255"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0255-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,8]]}}}