{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:03:29Z","timestamp":1769717009396,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460892","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["SMM rootkits"],"prefix":"10.1145","author":[{"given":"Shawn","family":"Embleton","sequence":"first","affiliation":[{"name":"University of Central Florida"}]},{"given":"Sherri","family":"Sparks","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Cliff","family":"Zou","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_2_1","volume-title":"HotOS XI: 11th Workshop on Hot Topics in Operating Systems","author":"Garfinkel T.","year":"2007"},{"key":"e_1_3_2_1_3_1","volume-title":"Black Hat USA","author":"Rutkowska J.","year":"2006"},{"key":"e_1_3_2_1_4_1","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3B: System Programming Guide Part 2. May 2007.  Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3B: System Programming Guide Part 2 . May 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3A: System Programming Guide Part 1. May 2007.  Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3A: System Programming Guide Part 1 . May 2007."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Corporation. Intel 82801DB I\/O Controller Hub 4 (ICH4). May 2002.  Intel Corporation. Intel 82801DB I\/O Controller Hub 4 (ICH4) . May 2002."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel Corporation. Intel 845GE\/845PE Chipset Datasheet. Oct. 2002.  Intel Corporation. Intel 845GE\/845PE Chipset Datasheet . Oct. 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"Black Hat Federal","author":"Heasman J.","year":"2006"},{"key":"e_1_3_2_1_9_1","unstructured":"L. Duflot D. Etiemble and O. Grumelard. Using CPU System Management Mode to Circumvent Operating System Security Functions. In. DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex France. 2007.  L. Duflot D. Etiemble and O. Grumelard. Using CPU System Management Mode to Circumvent Operating System Security Functions. In. DCSSI 51 bd. De la Tour Maubourg 75700 Paris Cedex France . 2007."},{"key":"e_1_3_2_1_10_1","series-title":"0x14","volume-title":"Phrack","author":"Sparks S.","year":"2005"},{"key":"e_1_3_2_1_11_1","unstructured":"J. Butler. VICE - Catch the Hookers. Presented at Black Hat USA. Aug 2004.  J. Butler. VICE - Catch the Hookers. Presented at Black Hat USA . Aug 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_13_1","volume-title":"Addison-Wesley","author":"Butler J.","year":"2005"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. Usenix Security Symposium","author":"Petroni N. L.","year":"2004"},{"key":"e_1_3_2_1_15_1","unstructured":"8042 Keyboard Controller. http:\/\/heim.ifi.uio.no\/~stanisls\/helppc\/8042.html  8042 Keyboard Controller. http:\/\/heim.ifi.uio.no\/~stanisls\/helppc\/8042.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Rootkit. http:\/\/en.wikipedia.org\/wiki\/Rootkit. 2007.  Rootkit. http:\/\/en.wikipedia.org\/wiki\/Rootkit. 2007."},{"key":"e_1_3_2_1_17_1","unstructured":"B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1 2006. http:\/\/www.microsoft.com\/technet\/sysinternals\/Utilities\/Ro otkitRevealer.mspx  B. Cogswell and M. Russinovich. RootkitRevealer v1.71. Nov 1 2006. http:\/\/www.microsoft.com\/technet\/sysinternals\/Utilities\/Ro otkitRevealer.mspx"},{"key":"e_1_3_2_1_18_1","unstructured":"F-Secure Black Light. http:\/\/www.f-secure.com\/blacklight  F-Secure Black Light. http:\/\/www.f-secure.com\/blacklight"},{"issue":"7","key":"e_1_3_2_1_19_1","first-page":"444","volume":"41","author":"Anderson S.","year":"1998","journal-title":"Cairns. A Framework for Modeling Trojans and Computer Virus Infections. The Computer Journal"},{"issue":"55","key":"e_1_3_2_1_20_1","volume":"9","author":"Hoglund G.","year":"1999","journal-title":"NT Kernel. In Phrack Magazine"},{"key":"e_1_3_2_1_21_1","unstructured":"Fuzen Op. The FU rootkit. http:\/\/www.rootkit.com\/project.php?id=12.  Fuzen Op. The FU rootkit. http:\/\/www.rootkit.com\/project.php?id=12."},{"key":"e_1_3_2_1_22_1","unstructured":"J. Rutkowska. System Virginity Verifier -- Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box. Sept 2005.  J. Rutkowska. System Virginity Verifier -- Defining the Roadmap for Malware Detection on Windows System. Presented at Hack In The Box . Sept 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"Black Hat USA","author":"Zovi D. A.","year":"2006"},{"key":"e_1_3_2_1_24_1","unstructured":"J. Rutkowska. New Blue Pill. http:\/\/www.bluepillproject.org\/stuff\/nbp-0.11.zip. 2007  J. Rutkowska. New Blue Pill. http:\/\/www.bluepillproject.org\/stuff\/nbp-0.11.zip. 2007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal. 2006.  J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit. Presented at Black Hat Federal . 2006.","DOI":"10.1016\/S1353-4858(06)70326-9"},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.blackhat.com\/presentations\/bh-federal-06\/BHFed-06-Heasman.pdf  http:\/\/www.blackhat.com\/presentations\/bh-federal-06\/BHFed-06-Heasman.pdf"},{"key":"e_1_3_2_1_27_1","unstructured":"J. Butler and S. Sparks. Windows rootkits of 2005 part two. http:\/\/www.securityfocus.com\/infocus\/1851. 2005.  J. Butler and S. Sparks. Windows rootkits of 2005 part two. http:\/\/www.securityfocus.com\/infocus\/1851. 2005."},{"key":"e_1_3_2_1_28_1","unstructured":"J. Rutkowska. IsGameOver() Anyone? Presented at Black Hat USA. Aug 2007.  J. Rutkowska. IsGameOver() Anyone? Presented at Black Hat USA . Aug 2007."},{"key":"e_1_3_2_1_29_1","unstructured":"Windbg. http:\/\/en.wikipedia.org\/wiki\/WinDbg.2007.  Windbg. http:\/\/en.wikipedia.org\/wiki\/WinDbg.2007."},{"key":"e_1_3_2_1_30_1","unstructured":"Support for USB and Legacy Keyboards and Mouse Devices. Dec 2001. http:\/\/www.microsoft.com\/whdc\/device\/input\/usbhost.mspx  Support for USB and Legacy Keyboards and Mouse Devices. Dec 2001. http:\/\/www.microsoft.com\/whdc\/device\/input\/usbhost.mspx"}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","location":"Istanbul Turkey","acronym":"Securecomm08","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460892"}},"subtitle":["a new breed of OS independent malware"],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":30,"alternative-id":["10.1145\/1460877.1460892","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460892","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}