{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:54:29Z","timestamp":1768416869856,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,8]]},"DOI":"10.1109\/globecom52923.2024.10901578","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:35Z","timestamp":1741714235000},"page":"3081-3086","source":"Crossref","is-referenced-by-count":1,"title":["eBPF-Based Approach to Tracing System Calls and Predicting Privilege Escalation Attacks"],"prefix":"10.1109","author":[{"given":"F\u00e1bio Junior","family":"Bertinatto","sequence":"first","affiliation":[{"name":"Federal University of Rio Grande do Sul,Institute of Informatics,Porto Alegre,Brazil"}]},{"given":"Daniel","family":"Arioza Almeida","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Sul,Institute of Informatics,Porto Alegre,Brazil"}]},{"given":"J\u00e9ferson","family":"Nobre","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Sul,Institute of Informatics,Porto Alegre,Brazil"}]},{"given":"Lisandro Z","family":"Granville","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Sul,Institute of Informatics,Porto Alegre,Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cncf annual survey 2022","year":"2023"},{"key":"ref2","article-title":"9 insights on real-world container usage","author":"CDatadog","year":"2023"},{"key":"ref3","article-title":"The state of container security","author":"Security","year":"2023"},{"key":"ref4","first-page":"102033","article-title":"Privilege escalation vulnerabilities in the wild: a decade of attacks on the windows kernel","volume":"100","author":"Nikolova","year":"2021","journal-title":"Computers & Security"},{"key":"ref5","first-page":"255","article-title":"Vulnerabilities in containerized applications: A case study","volume-title":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","author":"Maidul"},{"key":"ref6","first-page":"305","article-title":"Hardening kubernetes: Security from scratch","volume-title":"2021 IEEE\/ACM 13th International Conference on Utility and Cloud Computing Companion (UCC Companion)","author":"Barnett"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414047"},{"key":"ref9","article-title":"Learning classifiers for misuse and anomaly detection using a bag of system calls representation","author":"Fuller","year":"2007","journal-title":"Journal Name"},{"key":"ref10","article-title":"Detecting anomalies in iaas environments through virtual machine host system call analysis","author":"Alarifi","year":"2015","journal-title":"Journal Name"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-980109"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2022.3194266"},{"key":"ref13","first-page":"117","article-title":"Observability and chaos engineering on system calls for containerized applications in docker","volume-title":"Future Generation Computer Systems","volume":"122","author":"Simonsson","year":"2021"},{"key":"ref14","first-page":"259","article-title":"The BSD packet filter: A new architecture for user-level packet capture","volume-title":"Proceedings of the Winter 1993 USENIX Conference","author":"McCanne"},{"key":"ref15","article-title":"Bpf: the universal in-kernel virtual machine","author":"Corbet","year":"2023"},{"key":"ref16","article-title":"Linux socket filtering aka berkeley packet filter (bpf)","author":"Schulist","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN53031.2021.9665095"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3158644"},{"key":"ref20","article-title":"ebpf - introduction, tutorials & community resources","year":"2023"},{"key":"ref21","article-title":"Linux operating system","author":"Torvalds","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631251"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504911"}],"event":{"name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","location":"Cape Town, South Africa","start":{"date-parts":[[2024,12,8]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["GLOBECOM 2024 - 2024 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10900933\/10900934\/10901578.pdf?arnumber=10901578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T05:29:51Z","timestamp":1741757391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10901578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/globecom52923.2024.10901578","relation":{},"subject":[],"published":{"date-parts":[[2024,12,8]]}}}