{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:54Z","timestamp":1750307154783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T00:00:00Z","timestamp":1318377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,12]]},"DOI":"10.1145\/2179298.2179377","type":"proceedings-article","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T17:52:37Z","timestamp":1333475557000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Flying under the radar"],"prefix":"10.1145","author":[{"given":"Jinpeng","family":"Wei","sequence":"first","affiliation":[]},{"given":"Calton","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Keke","family":"Chen","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2011,10,12]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1145\/1102120.1102165"},{"unstructured":"Boldewin F. 2007. Peacomm.C - Cracking the nutshell. Anti Rootkit. http:\/\/www.antirootkit.com\/articles\/eye-of-the-storm-worm\/Peacomm-C-Cracking-the-nutshell.html.  Boldewin F. 2007. Peacomm.C - Cracking the nutshell. Anti Rootkit . http:\/\/www.antirootkit.com\/articles\/eye-of-the-storm-worm\/Peacomm-C-Cracking-the-nutshell.html.","key":"e_1_3_2_2_2_1"},{"unstructured":"Bovet D. and Cesati M. 2002. Understanding the Linux Kernel Second Edition. O'Reilly. ISBN: 0-596-00213-0.   Bovet D. and Cesati M. 2002. Understanding the Linux Kernel Second Edition. O'Reilly. ISBN: 0-596-00213-0.","key":"e_1_3_2_2_3_1"},{"unstructured":"Brumley D. 1999. Invisible intruders: rootkits in practice. USENIX login.  Brumley D. 1999. Invisible intruders: rootkits in practice. USENIX login .","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. of the 7th USENIX Security Symposium.","author":"Cowan C.","year":"1998","unstructured":"Cowan , C. , Pu , C. , 1998 . StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks . In Proc. of the 7th USENIX Security Symposium. Cowan, C., Pu, C., et al. 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. of the 7th USENIX Security Symposium."},{"unstructured":"Gross G. 2009. Cybercriminals Can Shut Down U.S. Electrical Grid. http:\/\/www.cio.com\/article\/488716\/Cybercriminals_Can_Sh ut_Down_U.S._Electrical_Grid  Gross G. 2009. Cybercriminals Can Shut Down U.S. Electrical Grid. http:\/\/www.cio.com\/article\/488716\/Cybercriminals_Can_Sh ut_Down_U.S._Electrical_Grid","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","volume-title":"Rootkits: The next big enterprise threat? http:\/\/www.infoworld.com\/d\/security-central\/rootkits-next-big-enterprise-threat-781","author":"Hultquist S.","year":"2007","unstructured":"Hultquist , S. 2007 . Rootkits: The next big enterprise threat? http:\/\/www.infoworld.com\/d\/security-central\/rootkits-next-big-enterprise-threat-781 Hultquist, S. 2007. Rootkits: The next big enterprise threat? http:\/\/www.infoworld.com\/d\/security-central\/rootkits-next-big-enterprise-threat-781"},{"unstructured":"Kwiatek L. and Litawa S. 2008. Yet another Rustock analysis... Virus Bulletin.  Kwiatek L. and Litawa S. 2008. Yet another Rustock analysis... Virus Bulletin .","key":"e_1_3_2_2_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1145\/1315245.1315260"},{"volume-title":"Writing Linux Kernel Keylogger. Phrack","author":"Phrack Inc. 2002.","unstructured":"Phrack Inc. 2002. Writing Linux Kernel Keylogger. Phrack Volume 0x0b, Issue 0x3b, Phile #0x0e of 0x 12 . Phrack Inc. 2002. Writing Linux Kernel Keylogger. Phrack Volume 0x0b, Issue 0x3b, Phile #0x0e of 0x12.","key":"e_1_3_2_2_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/1294261.1294294"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1109\/ACSAC.2008.40"}],"event":{"sponsor":["Eurosis Eurosis","Oak Ridge National Laboratory","University of Tennessee University of Tennessee"],"acronym":"CSIIRW '11","name":"CSIIRW '11: Cyber Security and Information Intelligence Research Workshop","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2179298.2179377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:20Z","timestamp":1750240460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179377"}},"subtitle":["maintaining control of kernel without changing kernel code or persistent data structures"],"short-title":[],"issued":{"date-parts":[[2011,10,12]]},"references-count":12,"alternative-id":["10.1145\/2179298.2179377","10.1145\/2179298"],"URL":"https:\/\/doi.org\/10.1145\/2179298.2179377","relation":{},"subject":[],"published":{"date-parts":[[2011,10,12]]},"assertion":[{"value":"2011-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}