{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:39:15Z","timestamp":1761824355410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Polish National Centre for Research and Development","award":["CYBERSECIDENT\/369532\/I\/NCBR\/2017"],"award-info":[{"award-number":["CYBERSECIDENT\/369532\/I\/NCBR\/2017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,11]]},"DOI":"10.1145\/3514105.3514114","type":"proceedings-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:23:47Z","timestamp":1648808627000},"page":"47-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The design of the simple SMM rootkit"],"prefix":"10.1145","author":[{"given":"Michal","family":"Szaknis","sequence":"first","affiliation":[{"name":"Institute of Telecommunications, Warsaw University of Technology, Poland"}]},{"given":"Krzysztof","family":"Szczypiorski","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Warsaw University of Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,4]]},"reference":[{"volume-title":"EDK II UEFI Driver Writer\u2019s Guide. Remote access (01","year":"2021","unstructured":"[n.d.]. EDK II UEFI Driver Writer\u2019s Guide. Remote access (01 Sep 2021 ): https:\/\/edk2-docs.gitbook.io\/edk-ii-uefi-driver-writer-s-guide\/. [n.d.]. EDK II UEFI Driver Writer\u2019s Guide. Remote access (01 Sep 2021): https:\/\/edk2-docs.gitbook.io\/edk-ii-uefi-driver-writer-s-guide\/.","key":"e_1_3_2_1_1_1"},{"volume-title":"EDK2 repository. Remote access (01","year":"2021","unstructured":"[n.d.]. EDK2 repository. Remote access (01 Sep 2021 ): https:\/\/github.com\/tianocore\/edk2. [n.d.]. EDK2 repository. Remote access (01 Sep 2021): https:\/\/github.com\/tianocore\/edk2.","key":"e_1_3_2_1_2_1"},{"volume-title":"Unified Extensible Firmware Interface (UEFI) Specification. Remote access (01","year":"2021","unstructured":"[n.d.]. Unified Extensible Firmware Interface (UEFI) Specification. Remote access (01 Sep 2021 ): https:\/\/uefi.org\/sites\/default\/files\/resources\/UEFI_Spec_2_8_final.pdf. [n.d.]. Unified Extensible Firmware Interface (UEFI) Specification. Remote access (01 Sep 2021): https:\/\/uefi.org\/sites\/default\/files\/resources\/UEFI_Spec_2_8_final.pdf.","key":"e_1_3_2_1_3_1"},{"unstructured":"2021. Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual.  2021. Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"UEFI Firmware Rootkits: Myths and Reality. Remote access (01","author":"Alex\u00a0Matrosov Eugene\u00a0Rodionov","year":"2021","unstructured":"Eugene\u00a0Rodionov Alex\u00a0Matrosov . 2017. UEFI Firmware Rootkits: Myths and Reality. Remote access (01 Sep 2021 ): https:\/\/www.blackhat.com\/docs\/asia-17\/materials\/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf. Eugene\u00a0Rodionov Alex\u00a0Matrosov. 2017. UEFI Firmware Rootkits: Myths and Reality. Remote access (01 Sep 2021): https:\/\/www.blackhat.com\/docs\/asia-17\/materials\/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/FRUCT.2013.6737940"},{"key":"e_1_3_2_1_7_1","volume-title":"Safeguarding rootkits: Intel BootGuard. Remote access (01","author":"Ermolov Alexander","year":"2021","unstructured":"Alexander Ermolov . 2016. Safeguarding rootkits: Intel BootGuard. Remote access (01 Sep 2021 ): https:\/\/2016.zeronights.ru\/wp-content\/uploads\/2017\/03\/Intel-BootGuard.pdf. Alexander Ermolov. 2016. Safeguarding rootkits: Intel BootGuard. Remote access (01 Sep 2021): https:\/\/2016.zeronights.ru\/wp-content\/uploads\/2017\/03\/Intel-BootGuard.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"Exploiting the Linux Kernel for Fun and (Educational) Profit. 22, 2","author":"Gaspar Alessio","year":"2006","unstructured":"Alessio Gaspar and Clark Godwin . 2006. Root-Kits & Loadable Kernel Modules : Exploiting the Linux Kernel for Fun and (Educational) Profit. 22, 2 ( 2006 ). Alessio Gaspar and Clark Godwin. 2006. Root-Kits & Loadable Kernel Modules: Exploiting the Linux Kernel for Fun and (Educational) Profit. 22, 2 (2006)."},{"key":"e_1_3_2_1_9_1","volume-title":"Building reliable SMM backdoor for UEFI based platforms. ([n. d.]). Remote access (01","author":"Oleksiuk Dmytro","year":"2021","unstructured":"Dmytro Oleksiuk . [n.d.]. Building reliable SMM backdoor for UEFI based platforms. ([n. d.]). Remote access (01 Sep 2021 ): http:\/\/blog.cr4.sh\/2015\/07\/building-reliable-smm-backdoor-for-uefi.html. Dmytro Oleksiuk. [n.d.]. Building reliable SMM backdoor for UEFI based platforms. ([n. d.]). Remote access (01 Sep 2021): http:\/\/blog.cr4.sh\/2015\/07\/building-reliable-smm-backdoor-for-uefi.html."},{"doi-asserted-by":"crossref","unstructured":"Julian Rauchberger Robert Luh and Sebastian Schrittwieser. 2017. Longkit - A Universal Framework for BIOS\/UEFI Rootkits in System Management Mode. https:\/\/doi.org\/10.5220\/0006165603460353 10.5220\/0006165603460353","key":"#cr-split#-e_1_3_2_1_10_1.1","DOI":"10.5220\/0006165603460353"},{"doi-asserted-by":"crossref","unstructured":"Julian Rauchberger Robert Luh and Sebastian Schrittwieser. 2017. Longkit - A Universal Framework for BIOS\/UEFI Rootkits in System Management Mode. https:\/\/doi.org\/10.5220\/0006165603460353","key":"#cr-split#-e_1_3_2_1_10_1.2","DOI":"10.5220\/0006165603460353"}],"event":{"acronym":"icWCSN 2022","name":"icWCSN 2022: 2022 9th international Conference on Wireless Communication and Sensor Networks","location":"Dalian China"},"container-title":["2022 9th international Conference on Wireless Communication and Sensor Networks (ICWCSN)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514105.3514114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:55Z","timestamp":1750186795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":11,"alternative-id":["10.1145\/3514105.3514114","10.1145\/3514105"],"URL":"https:\/\/doi.org\/10.1145\/3514105.3514114","relation":{},"subject":[],"published":{"date-parts":[[2022,1,11]]},"assertion":[{"value":"2022-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}