{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:08:21Z","timestamp":1760659701997,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11194984","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["We're eBPF'd: Exploring Adversarial Manipulation of ELF Files in eBPF-Based Programmable Network Stacks"],"prefix":"10.1109","author":[{"given":"Joe","family":"Rose","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow,Glasgow,Scotland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marco M.","family":"Cook","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow,Glasgow,Scotland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Filip","family":"Holik","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow,Glasgow,Scotland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios","family":"Pezaros","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow,Glasgow,Scotland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0185-4"},{"key":"ref3","first-page":"1","article-title":"XDP in practice: integrating XDP into our DDoS mitigation pipeline","volume-title":"Technical Conference on Linux Networking, Netdev","volume":"2","author":"Bertin","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft54395.2022.9844121"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070463"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102595"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2017.23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229058"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3431832.3431842"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020330"},{"key":"ref11","first-page":"5971","article-title":"Cross container attacks: The bewildered {eBPF} on clouds","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"He","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2400446"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/eucnc\/6gsummit63408.2025.11036869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2017.14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140489"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3416010.3423221"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560585"},{"article-title":"Linux Journal","volume-title":"The ELF Object File Format: Introduction| Linux Journal","year":"1995","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70896-1_10"},{"key":"ref21","article-title":"The NSA Makes Its Powerful Cyberse-curity Tool Open Source","author":"Newman","year":"2019","journal-title":"Wired"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471858"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569117"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3318251"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking57963.2023.10186412"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185468"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.36"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3371038"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2991\/iccsee.2013.250"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9084891"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11194984.pdf?arnumber=11194984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:49:42Z","timestamp":1760590182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11194984","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}