{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:45:30Z","timestamp":1746200730738},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iwia.2004.1288042","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"107-125","source":"Crossref","is-referenced-by-count":19,"title":["A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table"],"prefix":"10.1109","author":[{"given":"J.","family":"Levine","sequence":"first","affiliation":[]},{"given":"J.","family":"Grizzard","sequence":"additional","affiliation":[]},{"given":"H.","family":"Owen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Analysis of a Kernel Level Rootkit (Knark)","year":"0","author":"levine","key":"19"},{"year":"2003","key":"17"},{"key":"18","first-page":"255","author":"bovet","year":"2003","journal-title":"Understanding the Linux Kernel"},{"key":"15","first-page":"304","author":"bovet","year":"2003","journal-title":"Understanding the Linux Kernel"},{"year":"2003","key":"16"},{"year":"0","key":"13"},{"journal-title":"Linux-on-the-flykernel Patching without LKM","year":"2002","author":"devik","key":"14"},{"journal-title":"The Aide Manual","year":"2002","author":"lehti","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"journal-title":"\"Root Kits \" and Hiding Files\/Directories\/Processes after a Break-in","year":"2002","author":"dettrich","key":"3"},{"year":"0","key":"20"},{"key":"2","first-page":"548","author":"cole","year":"2002","journal-title":"Hackers Beware Indianapolis"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/41.7.444"},{"key":"10","first-page":"283","author":"northcut","year":"2003","journal-title":"Inside Network Perimeter Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"journal-title":"The Basics- Subverting the Kernel","year":"2003","key":"6"},{"key":"5","first-page":"626","author":"silberschatz","year":"2003","journal-title":"Applied Operating System Concepts"},{"key":"4","first-page":"434","author":"skoudis","year":"2002","journal-title":"Counter Hack"},{"journal-title":"Detecting Kernel Rootkits","year":"2003","key":"9"},{"year":"2003","key":"8"}],"event":{"name":"Second IEEE International Information Assurance Workshop, 2004.","location":"Charlotte, NC, USA"},"container-title":["Second IEEE International Information Assurance Workshop, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9053\/28708\/01288042.pdf?arnumber=1288042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T02:47:43Z","timestamp":1489459663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1288042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwia.2004.1288042","relation":{},"subject":[]}}