{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T03:18:13Z","timestamp":1648696693081},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2006,8,1]],"date-time":"2006-08-01T00:00:00Z","timestamp":1154390400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1007\/s11623-006-0256-5","type":"journal-article","created":{"date-parts":[[2007,10,18]],"date-time":"2007-10-18T07:48:32Z","timestamp":1192693712000},"page":"476-480","source":"Crossref","is-referenced-by-count":0,"title":["Windows Rootkits \u2014 und ihre Erkennung"],"prefix":"10.1007","volume":"30","author":[{"given":"Wilhelm","family":"Dolle","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Wegener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"256_CR1","unstructured":"TheRealAphex, AFX Rootkit 2005, http:\/\/www.rootkit.com\/vault\/therealaphex\/AFXRootkit2005.zip , M\u00e4rz 2005"},{"key":"256_CR2","unstructured":"Butler, J., VICE 2.0, http:\/\/www.rootkit.com\/vault\/fuzen_op\/vice.zip , April 2004"},{"key":"256_CR3","unstructured":"Butler, J., Sparks, S., Windows rootkits of 2005, part three, http:\/\/www.securityfocus.com\/infocus\/1854 , Januar 2006"},{"key":"256_CR4","unstructured":"Cogswell, B., Russinovich, M., Sysinternals RootkitRevealer, http:\/\/www.sysinternals.com\/utilities\/rootkitrevealer.html , Februar 2005"},{"key":"256_CR5","unstructured":"Dolle, W., Wegener, C., Auf den zweiten Blick \u2014 Rootkit-Erkennung unter Windows, iX Magazin f\u00fcr professionelle Informationstechnik, Dezember 2005"},{"key":"256_CR6","unstructured":"F-Secure, BlackLight, http:\/\/www.f-secure.com\/blacklight , M\u00e4rz 2005"},{"key":"256_CR7","unstructured":"Greatis, UnHackMe 3.1, http:\/\/www.greatis.com\/unhackme\/index.html , Mai 2006"},{"key":"256_CR8","unstructured":"Hoglund, G., Butler, J., Rootkits \u2014 den Windows-Kernel unterwandern, Addison-Wesley-Verlag 2005, ISBN 3-8273-2341-X"},{"key":"256_CR9","unstructured":"Keong, C.T., AntiHookExec Version 1.0 (Anti API Hooking Proof-Of-Concept), SIG 2 Secure Code Study Project, http:\/\/www.security.org.sg\/code\/antihookexec.html , April 2004"},{"key":"256_CR10","unstructured":"Microsoft, Strider GhostBuster Rootkit Detection, http:\/\/research.microsoft.com\/rootkit"},{"key":"256_CR11","unstructured":"RKDetector v2.0 \u2014 Security Analyzer & Rootkit Removal, http:\/\/www.rootkitdetector.com , November 2005"},{"key":"256_CR12","unstructured":"RootKit Hook Analyzer, http:\/\/www.resplendence.com\/hookanalyzer"},{"key":"256_CR13","unstructured":"Rutkowska, J., Detecting Windows Server Compromises with Patchfinder 2, http:\/\/www.invisiblethings.org\/papers\/rootkits_detection_with_patchfinder2.pdf , Januar 2004"},{"key":"256_CR14","unstructured":"Rutkowska, J., Patchfinder 2, http:\/\/www.invisiblethings.org\/tools\/PF2\/patchfinder_w2k_2.12.zip , Februar 2004"},{"key":"256_CR15","unstructured":"Rutkowska, J., System Virginity Verifier 2.3, http:\/\/www.invisiblethings.org\/tools\/svv\/svv-2.3-bin.zip , Februar 2005"},{"key":"256_CR16","unstructured":"Rutkowska, J., Thoughts about Cross-View based Rootkit Detection, http:\/\/www.invisiblethings.org\/papers\/crossview_detection_thoughts.pdf , Juni 2005"},{"key":"256_CR17","unstructured":"Sparks, S., Butler, J., Shadow Walker \u2014 Raising The Bar For Windows Rootkit Detection, Phrack Magazine, Issue 63, File 8, http:\/\/www.phrack.org\/phrack\/63\/p63-0x08_Raising_The_Bar_For_Windows_Rootkit_Detection.txt , August 2005"},{"key":"256_CR18","unstructured":"Wang, Y., et al., Stealth Software with Strider GhostBuster, In Proc. Int. Conf. on Dependable Systems and Networks (DSN-DCCS), ftp:\/\/ftp.research.microsoft.com\/pub\/tr\/TR-2005-25.pdf , Juni 2005"},{"key":"256_CR19","unstructured":"XFocus Team, IceSword 1.12en, http:\/\/xfocus.net\/tools\/200509\/1085.html , November 2005"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0256-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0256-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0256-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:21Z","timestamp":1559412501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0256-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2006,8]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0256-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,8]]}}}