{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:04:55Z","timestamp":1773903895463,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578797","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"109-112","source":"Crossref","is-referenced-by-count":2,"title":["Stealthy software: Next-generation cyber-attacks and defenses"],"prefix":"10.1109","author":[{"given":"Kevin W.","family":"Hamlen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"humble","year":"2013","journal-title":"Java Still Vulnerable Despite Latest Patches"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1387673.1387674"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"15","author":"cross","year":"2012","journal-title":"A Thing of Threads and Patches"},{"key":"16","author":"aron","year":"2012","journal-title":"Frankenstein Virus Creates Malware by Pilfering Code"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.04.004"},{"key":"14","first-page":"77","article-title":"Frankenstein: Stitching malware from benign binaries","author":"mohan","year":"2012","journal-title":"Proc 6th USENIX Workshop on Offensive Technologies"},{"key":"11","author":"kushner","year":"2013","journal-title":"The Real Story of Stuxnet"},{"key":"12","author":"hypponen","year":"2012","journal-title":"Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28756-5_10"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137306"},{"key":"24","first-page":"552","article-title":"The geometry of innocent flesh on the bone: Returninto-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Communications Security"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2011.176"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.211"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2019618.2019622"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228218"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63530"},{"key":"10","author":"sanger","year":"2012","journal-title":"Obama Order Sped Up Wave of Cyberattacks Against Iran"},{"key":"1","author":"cohen","year":"1986","journal-title":"Computer Viruses"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"6","year":"0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.01.002"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"9","year":"2012","journal-title":"Foundational Cyberwarfare (Plan X)"},{"key":"8","author":"shalal-esa","year":"2013","journal-title":"Six U S Air Force Cyber Capabilities Designated 'Weapons'"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Seattle, WA, USA","start":{"date-parts":[[2013,6,4]]},"end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578797.pdf?arnumber=6578797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:31:20Z","timestamp":1490200280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578797","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}