{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:09:12Z","timestamp":1753520952841,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1455770.1455840","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"555-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["BootJacker"],"prefix":"10.1145","author":[{"given":"Ellick M.","family":"Chan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Jeffrey C.","family":"Carlyle","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Francis M.","family":"David","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Reza","family":"Farivar","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson R.","year":"2001","unstructured":"R. Anderson . Security Engineering: A Guide to Building Dependable Distributed Systems . Wiley , First edition, January 2001 . R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, First edition, January 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_3_1","volume-title":"Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference, FREENIX Track","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . QEMU , a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference, FREENIX Track , 2005 . F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference, FREENIX Track, 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"RUXCON","author":"Boileau A.","year":"2006","unstructured":"A. Boileau . Hit By A Bus : Physical Access Attacks with Firewire . In RUXCON , Sydney, Australia , Sep 2006 . A. Boileau. Hit By A Bus: Physical Access Attacks with Firewire. In RUXCON, Sydney, Australia, Sep 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"May","author":"Bryson D.","year":"2001","unstructured":"D. Bryson . The Linux CryptoAPI A User's Perspective , May 2001 . D. Bryson. The Linux CryptoAPI A User's Perspective, May 2001."},{"key":"e_1_3_2_1_6_1","unstructured":"C. Cazabon. memtester. http:\/\/pyropus.ca\/software\/memtester\/.  C. Cazabon. memtester. http:\/\/pyropus.ca\/software\/memtester\/."},{"key":"e_1_3_2_1_7_1","unstructured":"O. S. Community. Bochs IA-32 Emulator Project. http:\/\/www.gnu.org\/software\/grub\/.  O. S. Community. Bochs IA-32 Emulator Project. http:\/\/www.gnu.org\/software\/grub\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Annual Technical Conference","author":"David F. M.","year":"2007","unstructured":"F. M. David , J. C. Carlyle , and R. H. Campbell . Exploring Recovery from Operating System Lockups . In USENIX Annual Technical Conference , Santa Clara, CA , June 2007 . F. M. David, J. C. Carlyle, and R. H. Campbell. Exploring Recovery from Operating System Lockups. In USENIX Annual Technical Conference, Santa Clara, CA, June 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.8"},{"key":"e_1_3_2_1_11_1","volume-title":"PacSec","author":"Dornseif M.","year":"2004","unstructured":"M. Dornseif . 0wned by an iPod . In PacSec , 2004 . M. Dornseif. 0wned by an iPod. In PacSec, 2004."},{"key":"e_1_3_2_1_12_1","volume-title":"New Methods in Hard Disk Encryption. Technical report","author":"Fruhwirth C.","year":"2005","unstructured":"C. Fruhwirth . New Methods in Hard Disk Encryption. Technical report , Vienna University of Technology , June 2005 . C. Fruhwirth. New Methods in Hard Disk Encryption. Technical report, Vienna University of Technology, June 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"Fuzen Op. The FU rootkit. http:\/\/www.rootkit.com\/project.php?id=12.  Fuzen Op. The FU rootkit. http:\/\/www.rootkit.com\/project.php?id=12."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A Virtual Machine Introspection Based Architecture for Intrusion Detection . In Proceedings of the Network and Distributed Systems Security Symposium , February 2003 . T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Proceedings of the Network and Distributed Systems Security Symposium, February 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"GNU. GRand Unified Bootloader. http:\/\/www.gnu.org\/software\/grub\/.  GNU. GRand Unified Bootloader. http:\/\/www.gnu.org\/software\/grub\/."},{"key":"e_1_3_2_1_16_1","volume-title":"CSI\/FBI Computer Crime and Security Survey","author":"Gordon L. A.","year":"2005","unstructured":"L. A. Gordon , M. P. Loeb , W. Lucyshyn , and R. Richardson . CSI\/FBI Computer Crime and Security Survey . Computer Security Institute , 2005 . L. A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson. CSI\/FBI Computer Crime and Security Survey. Computer Security Institute, 2005."},{"key":"e_1_3_2_1_17_1","first-page":"77","volume-title":"Proc. 6th USENIX Security Symposium","author":"Gutmann P.","year":"1996","unstructured":"P. Gutmann . Secure Deletion of Data from Magnetic and Solid-State Memory . In Proc. 6th USENIX Security Symposium , pages 77 -- 90 , July 1996 . P. Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory. In Proc. 6th USENIX Security Symposium, pages 77--90, July 1996."},{"key":"e_1_3_2_1_18_1","first-page":"39","volume-title":"Proceedings of the 10th USENIX Security Symposium","author":"Gutmann P.","year":"2001","unstructured":"P. Gutmann . Data Remanence in Semiconductor Devices . In Proceedings of the 10th USENIX Security Symposium , pages 39 -- 54 , Berkeley, CA, USA , 2001 . USENIX Association. P. Gutmann. Data Remanence in Semiconductor Devices. In Proceedings of the 10th USENIX Security Symposium, pages 39--54, Berkeley, CA, USA, 2001. USENIX Association."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Halderman J. A.","year":"2008","unstructured":"J. A. Halderman , S. D. Schoen , N. Heninger , W. Clarkson , W. Paul , and J. A. Calandrino . Lest We Remember: Cold Boot Attacks on Encryption Keys . In Proceedings of the 17th USENIX Security Symposium , San Jose, CA , July 2008 . J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, and J. A. Calandrino. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proceedings of the 17th USENIX Security Symposium, San Jose, CA, July 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"July","author":"Hamzeh K.","year":"1999","unstructured":"K. Hamzeh , G. Pall , W. Verthein , J. Taarud , W. Little , and G. Zorn . Point-to-Point Tunneling Protocol (PPTP). RFC 2637 (Informational) , July 1999 . K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn. Point-to-Point Tunneling Protocol (PPTP). RFC 2637 (Informational), July 1999."},{"key":"e_1_3_2_1_21_1","volume-title":"Implementing and Detecting a PCI Rootkit. Technical report","author":"Heasman J.","year":"2006","unstructured":"J. Heasman . Implementing and Detecting a PCI Rootkit. Technical report , Next Generation Security Software Ltd , November 2006 . J. Heasman. Implementing and Detecting a PCI Rootkit. Technical report, Next Generation Security Software Ltd, November 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029105"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646277.687180"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_26_1","volume-title":"Black Hat Europe","author":"Kumar N.","year":"2007","unstructured":"N. Kumar and V. Kumar . Vbootkit: Compromising Windows Vista Security . In Black Hat Europe , Amsterdam , March 2007 . N. Kumar and V. Kumar. Vbootkit: Compromising Windows Vista Security. In Black Hat Europe, Amsterdam, March 2007."},{"key":"e_1_3_2_1_27_1","first-page":"33","volume-title":"Archiv fur Elektronik und Ubertragungstechnik","author":"Link W.","year":"1979","unstructured":"W. Link and H. May . Eigenshaften von MOS--Ein--Transistorspeicherzellen bei tieften Temperaturen . In Archiv fur Elektronik und Ubertragungstechnik , pages 33 -- 229 --235, June 1979 . W. Link and H. May. Eigenshaften von MOS--Ein--Transistorspeicherzellen bei tieften Temperaturen. In Archiv fur Elektronik und Ubertragungstechnik, pages 33--229--235, June 1979."},{"volume-title":"PPPJ '03: Proceedings of","author":"Loughran J.","key":"e_1_3_2_1_28_1","unstructured":"J. Loughran and T. Dowling . A java implemented key collision attack on the data encryption standard (des) . In PPPJ '03: Proceedings of J. Loughran and T. Dowling. A java implemented key collision attack on the data encryption standard (des). In PPPJ '03: Proceedings of"},{"key":"e_1_3_2_1_29_1","first-page":"155","volume-title":"2nd international conference on Principles and practice of programming in Java","year":"2003","unstructured":"the 2nd international conference on Principles and practice of programming in Java , pages 155 -- 157 , New York, NY, USA , 2003 . Computer Science Press, Inc. the 2nd international conference on Principles and practice of programming in Java, pages 155--157, New York, NY, USA, 2003. Computer Science Press, Inc."},{"key":"e_1_3_2_1_30_1","volume-title":"80x86 IBM PC and Compatible Computers: Assembly Language, Design, and Interfacing","author":"Mazidi M. A.","year":"2002","unstructured":"M. A. Mazidi and J. G. Mazidi . 80x86 IBM PC and Compatible Computers: Assembly Language, Design, and Interfacing ; Volume I and II. Prentice Hall PTR , Upper Saddle River, NJ, USA, fourth edition, 2002 . M. A. Mazidi and J. G. Mazidi. 80x86 IBM PC and Compatible Computers: Assembly Language, Design, and Interfacing; Volume I and II. Prentice Hall PTR, Upper Saddle River, NJ, USA, fourth edition, 2002."},{"key":"e_1_3_2_1_31_1","unstructured":"J. M\u00c3d'kinen. Automated OS X Macintosh password retrieval via Firewire. http:\/\/blog.juhonkoti.net\/2008\/02\/29\/automated-os-x-macintosh-password-retrieval-via-firewire 2008.  J. M\u00c3d'kinen. Automated OS X Macintosh password retrieval via Firewire. http:\/\/blog.juhonkoti.net\/2008\/02\/29\/automated-os-x-macintosh-password-retrieval-via-firewire 2008."},{"key":"e_1_3_2_1_32_1","volume-title":"SyScan 2006","author":"Rutkowska J.","year":"2006","unstructured":"J. Rutkowska . Subverting Vista Kernel For Fun And Profit . In SyScan 2006 , Singapore , July 2006 . J. Rutkowska. Subverting Vista Kernel For Fun And Profit. In SyScan 2006, Singapore, July 2006."},{"key":"e_1_3_2_1_33_1","unstructured":"A. Seshadri M. Luk N. Qu and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for  A. Seshadri M. Luk N. Qu and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for"},{"key":"e_1_3_2_1_34_1","first-page":"335","volume-title":"OSes. In Proceedings of the twenty-first Symposium on Operating Systems Principles","author":"Commodity","year":"2007","unstructured":"Commodity OSes. In Proceedings of the twenty-first Symposium on Operating Systems Principles , pages 335 -- 350 , New York, NY, USA , 2007 . ACM. Commodity OSes. In Proceedings of the twenty-first Symposium on Operating Systems Principles, pages 335--350, New York, NY, USA, 2007. ACM."},{"key":"e_1_3_2_1_35_1","volume-title":"Low-Temperature Data Remanence in Static RAM. Technical report","author":"Skorobogatov S.","year":"2002","unstructured":"S. Skorobogatov . Low-Temperature Data Remanence in Static RAM. Technical report , University of Cambridge Computer Laboratory technical report No . 536, June 2002 . S. Skorobogatov. Low-Temperature Data Remanence in Static RAM. Technical report, University of Cambridge Computer Laboratory technical report No. 536, June 2002."},{"key":"e_1_3_2_1_36_1","volume-title":"Black Hat USA","author":"Soeder D.","year":"2005","unstructured":"D. Soeder and R. Permeh . eEye BootRoot . In Black Hat USA , Las Vegas , July 2005 . D. Soeder and R. Permeh. eEye BootRoot. In Black Hat USA, Las Vegas, July 2005."},{"key":"e_1_3_2_1_37_1","volume-title":"August","author":"Sparks S.","year":"2005","unstructured":"S. Sparks and J. Butler . Raising The Bar for Windows Rootkit Detection. Phrack, 11(63) , August 2005 . S. Sparks and J. Butler. Raising The Bar for Windows Rootkit Detection. Phrack, 11(63), August 2005."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996948"},{"key":"e_1_3_2_1_39_1","unstructured":"M. team. MPlayer. http:\/\/www.mplayerhq.hu\/.  M. team. MPlayer. http:\/\/www.mplayerhq.hu\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Trusted Computing Group. Trusted Platform Module version 1.2. http:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/.  Trusted Computing Group. Trusted Platform Module version 1.2. http:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/."},{"key":"e_1_3_2_1_41_1","unstructured":"WiebeTech. HotPlug: Transport a live computer without shutting it down. http:\/\/www.wiebetech.com\/products\/HotPlug.php 2008.  WiebeTech. HotPlug: Transport a live computer without shutting it down. http:\/\/www.wiebetech.com\/products\/HotPlug.php 2008."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 15th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1455770.1455840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:14Z","timestamp":1750287254000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455840"}},"subtitle":["compromising computers using forced restarts"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":41,"alternative-id":["10.1145\/1455770.1455840","10.1145\/1455770"],"URL":"https:\/\/doi.org\/10.1145\/1455770.1455840","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}