{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:57:04Z","timestamp":1757591824941,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T00:00:00Z","timestamp":1439164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,10]]},"DOI":"10.1145\/2791405.2791512","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"602-607","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Stealth Process using Hooking"],"prefix":"10.1145","author":[{"given":"Deepti","family":"Vidyarthi","sequence":"first","affiliation":[{"name":"Defence Institute of Advanced Technology, Girinagar, Pune, +919421661030"}]}],"member":"320","published-online":{"date-parts":[[2015,8,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"Q3","year":"2014","unstructured":"McAfee Quarterly Threat Report Q3 , 2014 . McAfee Quarterly Threat Report Q3, 2014.","journal-title":"McAfee Quarterly Threat Report"},{"key":"e_1_3_2_1_2_1","unstructured":"McAfee Labs - Threats Predictions 2015.  McAfee Labs - Threats Predictions 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium,(NDSS 2008)","author":"Zhenkai Liang Dawn Song Heng Yin","year":"2008","unstructured":"Heng Yin Zhenkai Liang Dawn Song , HookFinder : Identifying and Understanding Malware Hooking Behaviors , Proceedings of the Network and Distributed System Security Symposium,(NDSS 2008) , 2008 . Heng Yin Zhenkai Liang Dawn Song, HookFinder: Identifying and Understanding Malware Hooking Behaviors, Proceedings of the Network and Distributed System Security Symposium,(NDSS 2008), 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACIA.2008.4770042"},{"key":"e_1_3_2_1_5_1","volume-title":"Attack Assessments and Implications","author":"Prakash Aravind","year":"2013","unstructured":"Aravind Prakash , Eknath Venkataramani , Heng Yin , Zhiqiang Lin , Manipulating Semantic Values in Kernel Data Structures : Attack Assessments and Implications , IEEE 2013 . Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin,Manipulating Semantic Values in Kernel Data Structures: Attack Assessments and Implications, IEEE 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"Secrets of Reverse Engineering","author":"Eilam Eldad","year":"2005","unstructured":"Eldad Eilam , Reversing : Secrets of Reverse Engineering . Wiley Publishing, Inc. , 2005 . Eldad Eilam, Reversing: Secrets of Reverse Engineering. Wiley Publishing, Inc., 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"The 8th international Conference on Computer Science & Education (ICCSE 2013)","author":"Xin LIU","year":"2013","unstructured":"LIU Xin , LIU Ren-ren, WU Xiang-bo, A Secret Inline Hook Technology , The 8th international Conference on Computer Science & Education (ICCSE 2013) , 2013 . LIU Xin, LIU Ren-ren, WU Xiang-bo, A Secret Inline Hook Technology, The 8th international Conference on Computer Science & Education (ICCSE 2013), 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.38"},{"key":"e_1_3_2_1_9_1","volume-title":"The rootkit arsenal: Escape and evasion into the dark corners of the system","author":"Blunden Bill","year":"2009","unstructured":"Bill Blunden , The rootkit arsenal: Escape and evasion into the dark corners of the system , Jones & Bartlett Publishers , May 2009 . Bill Blunden, The rootkit arsenal: Escape and evasion into the dark corners of the system, Jones & Bartlett Publishers, May 2009."},{"key":"e_1_3_2_1_10_1","volume-title":"Microsoft Windows Internals","author":"Solomon Russinovich","year":"2005","unstructured":"Russinovich and Solomon , Microsoft Windows Internals , 4 th Edition, Microsoft Press , 2005 . Russinovich and Solomon, Microsoft Windows Internals, 4th Edition, Microsoft Press, 2005.","edition":"4"},{"key":"e_1_3_2_1_11_1","volume-title":"The Giant Black Book of Computer Viruses","author":"Ludwig Mark","year":"1998","unstructured":"Mark Ludwig , The Giant Black Book of Computer Viruses , 2 nd Edition, American Eagle Publications , 1998 . Mark Ludwig, The Giant Black Book of Computer Viruses, 2nd Edition, American Eagle Publications, 1998.","edition":"2"},{"key":"e_1_3_2_1_12_1","volume-title":"Windows Rootkit Overview","author":"White","year":"2006","unstructured":"White paper : Symantec Security Response , Windows Rootkit Overview , March 2006 . White paper: Symantec Security Response, Windows Rootkit Overview, March 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"McAfee Proven Security","author":"White","year":"2006","unstructured":"White paper : McAfee Proven Security , Rootkit : The growing threat, April 2006 . White paper: McAfee Proven Security, Rootkit: The growing threat, April 2006."}],"event":{"name":"WCI '15: Third International Symposium on Women in Computing and Informatics","acronym":"WCI '15","location":"Kochi India"},"container-title":["Proceedings of the Third International Symposium on Women in Computing and Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2791405.2791512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2791405.2791512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:19Z","timestamp":1750223239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2791405.2791512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,10]]},"references-count":13,"alternative-id":["10.1145\/2791405.2791512","10.1145\/2791405"],"URL":"https:\/\/doi.org\/10.1145\/2791405.2791512","relation":{},"subject":[],"published":{"date-parts":[[2015,8,10]]},"assertion":[{"value":"2015-08-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}