{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:08:47Z","timestamp":1770217727389,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["12011593"],"award-info":[{"award-number":["12011593"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523675","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"289-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["SPIDER"],"prefix":"10.1145","author":[{"given":"Zhui","family":"Deng","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Gdb. http:\/\/www.gnu.org\/software\/gdb\/.  Gdb. http:\/\/www.gnu.org\/software\/gdb\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Ida pro. http:\/\/www.hex-rays.com\/idapro\/.  Ida pro. http:\/\/www.hex-rays.com\/idapro\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Kvm. http:\/\/www.linux-kvm.org\/.  Kvm. http:\/\/www.linux-kvm.org\/."},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX ATC'12","author":"Agesen O."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_6_1","volume-title":"EICAR'06","author":"Bayer U."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX ATC'05","author":"Bellard F."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_9_1","volume-title":"Blackhat USA'12","author":"Branco R. R."},{"key":"e_1_3_2_1_10_1","unstructured":"D. Bruening. Efficient transparent and comprehensive runtime code manipulation. PhD thesis 2004.   D. Bruening. Efficient transparent and comprehensive runtime code manipulation . PhD thesis 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151043"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254830"},{"key":"e_1_3_2_1_13_1","volume-title":"DFRWS'12","author":"Deng Z."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150992"},{"key":"e_1_3_2_1_16_1","volume-title":"Symantec Advanced Threat Research","author":"Ferrie P.","year":"2006"},{"key":"e_1_3_2_1_17_1","volume-title":"Symantec Technology Exchange","author":"Ferrie P.","year":"2007"},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS'03","author":"Garfinkel T."},{"key":"e_1_3_2_1_19_1","unstructured":"M. Grace Z. Wang D. Srinivasan J. Li X. Jiang Z. Liang and S. Liakh. Transparent protection of commodity os kernels using hardware virtualization. In SecureComm'10.  M. Grace Z. Wang D. Srinivasan J. Li X. Jiang Z. Liang and S. Liakh. Transparent protection of commodity os kernels using hardware virtualization. In SecureComm'10 ."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"e_1_3_2_1_21_1","unstructured":"Intel. Intel 64 and IA-32 Architectures Software Developer's Manual volume 3C.  Intel. Intel 64 and IA-32 Architectures Software Developer's Manual volume 3C."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655151"},{"key":"e_1_3_2_1_23_1","volume-title":"ISPASS'10","author":"Laurenzano M. A."},{"key":"e_1_3_2_1_24_1","volume":"199","author":"Lawton K. P.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_25_1","volume-title":"NDSS'13","author":"Lee K. H."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_27_1","unstructured":"N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation.  N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.48"},{"key":"e_1_3_2_1_29_1","volume-title":"ISC'07","author":"Raffetseder T."},{"key":"e_1_3_2_1_30_1","unstructured":"N. Riva and F. Falc\u00f3n. Dynamic binary instrumentation frameworks: I know you're there spying on me. REcon'12.  N. Riva and F. Falc\u00f3n. Dynamic binary instrumentation frameworks: I know you're there spying on me. REcon'12."},{"key":"e_1_3_2_1_31_1","volume-title":"Blackhat USA'06","author":"Rutkowska J."},{"key":"e_1_3_2_1_32_1","volume-title":"CGO'03","author":"Scott K."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_34_1","unstructured":"A. Vasudevan. Re-inforced stealth breakpoints. In CRiSIS'09.  A. Vasudevan. Re-inforced stealth breakpoints. In CRiSIS'09 ."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.52"},{"key":"e_1_3_2_1_37_1","unstructured":"S. Vogl and C. Eckert. Using hardware performance events for instruction-level monitoring on the x86 architecture. In EuroSec'12.  S. Vogl and C. Eckert. Using hardware performance events for instruction-level monitoring on the x86 architecture. In EuroSec'12 ."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420980"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151053"},{"key":"e_1_3_2_1_40_1","unstructured":"O. Yuschuk. Ollydbg. http:\/\/www.ollydbg.de\/.  O. Yuschuk. Ollydbg. http:\/\/www.ollydbg.de\/."}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523675"}},"subtitle":["stealthy binary program instrumentation and debugging via hardware virtualization"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":40,"alternative-id":["10.1145\/2523649.2523675","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523675","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}