{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T11:17:57Z","timestamp":1649071077856},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/s11623-007-0266-y","type":"journal-article","created":{"date-parts":[[2007,11,19]],"date-time":"2007-11-19T21:40:39Z","timestamp":1195508439000},"page":"822-826","source":"Crossref","is-referenced-by-count":0,"title":["Virtualisierende Rootkits, die fast perfekte Tarnung"],"prefix":"10.1007","volume":"31","author":[{"given":"Manuel","family":"Laggner","sequence":"first","affiliation":[]},{"given":"Eckehard","family":"Hermann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"266_CR1","doi-asserted-by":"crossref","unstructured":"King, Samuel; Subvirt: Implementing Malware with virtual machines. http:\/\/www.eecs.umich.edu\/:_pmchen\/papers\/king06.pdf M\u00e4rz 2006.","DOI":"10.1109\/SP.2006.38"},{"key":"266_CR2","unstructured":"Rutkowska, Joanna; Red Pill, http:\/\/invisiblethings.org\/papers\/redpill.html"},{"key":"266_CR3","unstructured":"Klein, Tobias; scoopydoo, http:\/\/trapkit.de\/research\/vmm\/scoopydoo\/index.html"},{"key":"266_CR4","unstructured":"Klein, Tobias; jerry, http:\/\/trapkit.de\/research\/vmm\/jerry\/index.html"},{"key":"266_CR5","unstructured":"Laggner, Manuel; Erkennen virtualisierender Rootkits, Masterarbeit FH-O\u00d6 Campus Hagenberg, 2007"},{"key":"266_CR6","unstructured":"Tanenbaum, Andrew S.; Moderne Betriebssysteme, Hanser-Verlag, 2003"},{"key":"266_CR7","unstructured":"Radonic, A.; Meyer, F.; XEN3 3, Franzis Profession Series, 2006"},{"key":"266_CR8","unstructured":"Kern, C.; Paravirtualisierung und Virtualisierungstechnologie, http:\/\/www.lrr.in.tum.de\/:_stodden\/teaching\/sem\/virt\/ss06\/doc\/virt06-07-20060531-kern-sld%20-%20Paravirtualisierung.pdf , 2006."},{"key":"266_CR9","unstructured":"Rosen, R.; Virtualization in Xen 3.0, http:\/\/www.linuxjournal.com\/article\/8909 , 2006."},{"key":"266_CR10","unstructured":"Vrtala, A.; Ihr Linux-Rechner wurde assimiliert \u2014 ist Widerstand zwecklos? Rootkits unter Linux, http:\/\/www.univie.ac.at\/comment\/06-\/06_19.html , 2006."},{"key":"266_CR11","unstructured":"Alsbih, A.; Rootkits f\u00fcr den Linux-Kernel 2.6, Linux Magazin, Ausgabe 06, Seite 56-61, 2006."},{"key":"266_CR12","unstructured":"Kato, K.; VMware Backdoor I\/O Port, http:\/\/chitchat.at.infoseek.co.jp\/vmware\/backdoor.html , 2006."},{"key":"266_CR13","unstructured":"Liston, Tom und Skoudis, E.; On the Cutting Edge: Thwarting Virtual Machine Detection, http:\/\/handlers.sans.org\/tliston\/ThwartingVMDetection_Liston_Skoudis.pdf , 2006."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0266-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0266-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0266-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:26Z","timestamp":1559398106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0266-y"}},"subtitle":["Aufbau, Funktionsweise &amp; Erkennung"],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":13,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["266"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0266-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}