{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:11Z","timestamp":1750307171102,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-09-1-0075"],"award-info":[{"award-number":["FA8750-09-1-0075"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076788","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"393-402","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["From prey to hunter"],"prefix":"10.1145","author":[{"given":"Ang","family":"Cui","sequence":"first","affiliation":[{"name":"Columbia University, New York NY"}]},{"given":"Jatin","family":"Kataria","sequence":"additional","affiliation":[{"name":"Columbia University, New York NY"}]},{"given":"Salvatore J.","family":"Stofo","sequence":"additional","affiliation":[{"name":"Columbia University, New York NY"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"kaiten.c IRC DDOS Bot. http:\/\/packetstormsecurity.nl\/irc\/kaiten.c.  kaiten.c IRC DDOS Bot. http:\/\/packetstormsecurity.nl\/irc\/kaiten.c."},{"key":"e_1_3_2_1_2_1","unstructured":"Microsoft Corporation Kernel Patch Protection: Frequently Asked Questions. http:\/\/tinyurl.com\/y7pss5y 2006.  Microsoft Corporation Kernel Patch Protection: Frequently Asked Questions. http:\/\/tinyurl.com\/y7pss5y 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"Malware for Home Routers","author":"Your Internet The End","year":"2008","unstructured":"The End of Your Internet : Malware for Home Routers , 2008 . http:\/\/tinyurl.com\/3d9yv9l. The End of Your Internet: Malware for Home Routers, 2008. http:\/\/tinyurl.com\/3d9yv9l."},{"key":"e_1_3_2_1_4_1","unstructured":"Network Bluepill. Dronebl.org 2008. http:\/\/www.dronebl.org\/blog\/8.  Network Bluepill. Dronebl.org 2008. http:\/\/www.dronebl.org\/blog\/8."},{"key":"e_1_3_2_1_5_1","unstructured":"New worm can infect home modem\/routers. APCMAG.com 2009. http:\/\/apcmag.com\/Content.aspx?id=3687.  New worm can infect home modem\/routers. APCMAG.com 2009. http:\/\/apcmag.com\/Content.aspx?id=3687."},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","first-page":"160","volume-title":"Digital Rights Management Workshop","author":"Chang Hoi","year":"2001","unstructured":"Hoi Chang and Mikhail J. Atallah . Protecting software code by guards . In Tomas Sander, editor, Digital Rights Management Workshop , volume 2320 of Lecture Notes in Computer Science , pages 160 -- 175 . Springer , 2001 . Hoi Chang and Mikhail J. Atallah. Protecting software code by guards. In Tomas Sander, editor, Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, pages 160--175. Springer, 2001."},{"volume-title":"5th USENIX Workshop on Offensive Technologies.","author":"Cui Ang","key":"e_1_3_2_1_7_1","unstructured":"Ang Cui , Jatin Kataria , and Salvatore J. Stolfo . Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios, 2011 . 5th USENIX Workshop on Offensive Technologies. Ang Cui, Jatin Kataria, and Salvatore J. Stolfo. Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios, 2011. 5th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_19"},{"key":"e_1_3_2_1_10_1","first-page":"127","volume-title":"Anas Abou El Kalam","author":"Ghourabi Abdallah","year":"2009","unstructured":"Abdallah Ghourabi , Tarek Abbes , and Adel Bouhoula . Honeypot router for routing protocols protection . In Anas Abou El Kalam , Yves Deswarte, and Mahmoud Mostafa, editors, CRiSIS, pages 127 -- 130 . IEEE , 2009 . Abdallah Ghourabi, Tarek Abbes, and Adel Bouhoula. Honeypot router for routing protocols protection. In Anas Abou El Kalam, Yves Deswarte, and Mahmoud Mostafa, editors, CRiSIS, pages 127--130. IEEE, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.19"},{"key":"e_1_3_2_1_12_1","volume-title":"BlackHat USA","author":"Linder Felix","year":"2003","unstructured":"Felix \"FX\" Linder . Cisco Vulnerabilities . In In BlackHat USA , 2003 . Felix \"FX\" Linder. Cisco Vulnerabilities. In In BlackHat USA, 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"In BlackHat USA","author":"Linder Felix","year":"2009","unstructured":"Felix \"FX\" Linder . Cisco IOS Router Exploitation . In In BlackHat USA , 2009 . Felix \"FX\" Linder. Cisco IOS Router Exploitation. In In BlackHat USA, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006"},{"key":"e_1_3_2_1_15_1","volume-title":"Cisco IOS Shellcode","author":"Lynn Michael","year":"2005","unstructured":"Michael Lynn . Cisco IOS Shellcode , 2005 . In BlackHat USA. Michael Lynn. Cisco IOS Shellcode, 2005. In BlackHat USA."},{"key":"e_1_3_2_1_16_1","volume-title":"Killing the myth of Cisco IOS rootkits: DIK","author":"Muniz Sebastian","year":"2008","unstructured":"Sebastian Muniz . Killing the myth of Cisco IOS rootkits: DIK , 2008 . In EUSecWest . Sebastian Muniz. Killing the myth of Cisco IOS rootkits: DIK, 2008. In EUSecWest."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433008"},{"key":"e_1_3_2_1_18_1","volume-title":"BlackHat USA","author":"Roecher Dror-John","year":"2007","unstructured":"Dror-John Roecher and Michael Thumann . NAC Attack . In In BlackHat USA , 2007 . Dror-John Roecher and Michael Thumann. NAC Attack. In In BlackHat USA, 2007."},{"key":"e_1_3_2_1_19_1","first-page":"2","year":"2008","unstructured":"Skywing. Subverting PatchGuard Version 2 , 2008 . Uninformed, Volume 6. Skywing. Subverting PatchGuard Version 2, 2008. Uninformed, Volume 6.","journal-title":"Skywing. Subverting PatchGuard Version"},{"key":"e_1_3_2_1_20_1","first-page":"17","author":"Song Yingbo","year":"2009","unstructured":"Yingbo Song , Pratap V. Prahbu , and Salvatore J. Stolfo . Smashing the stack with hydra: The many heads of advanced shellcode polymorphism. In Defcon 17 , 2009 . Yingbo Song, Pratap V. Prahbu, and Salvatore J. Stolfo. Smashing the stack with hydra: The many heads of advanced shellcode polymorphism. In Defcon 17, 2009.","journal-title":"Defcon"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1521747.1521783"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_2"}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '11"},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076788"}},"subtitle":["transforming legacy embedded devices into exploitation sensor grids"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":22,"alternative-id":["10.1145\/2076732.2076788","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076788","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}