{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:48:36Z","timestamp":1729619316993,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.23919\/date.2017.7927236","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T16:34:41Z","timestamp":1494866081000},"page":"1546-1551","source":"Crossref","is-referenced-by-count":9,"title":["Hardware-based on-line intrusion detection via system call routine fingerprinting"],"prefix":"10.23919","author":[{"given":"Liwei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yiorgos","family":"Makris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495577"},{"key":"ref11","first-page":"1","article-title":"Antfarm: Tracking processes in a virtual machine environment","author":"jones","year":"0","journal-title":"Proc USENIX Annu Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.10.007"},{"key":"ref14","article-title":"Comparative study of Bloom filter architectures","volume":"12","author":"chhabra","year":"2012","journal-title":"Global Journal of Researches in Engineering Electrical and Electronics Engineering"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1007\/11841036_42","article-title":"Less hashing, same performance: Building a better Bloom filter","volume":"4168","author":"kirsch","year":"2006","journal-title":"Algorithms-ESA 2006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2007.44"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474374"},{"key":"ref5","first-page":"96","article-title":"Nitro: Hardware-based system call tracing for virtual machines","author":"pfoh","year":"0","journal-title":"6th Intl Conf on Advances in Information and Computer Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"ref1","first-page":"351","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"0","journal-title":"18th USENIX Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref20","first-page":"161","article-title":"Control-flow bending: On the effectiveness of control-flow integrity","author":"carlini","year":"0","journal-title":"Proc 24th USENIX Conf Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378629"}],"event":{"name":"2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2017,3,27]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2017,3,31]]}},"container-title":["Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2017"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7919927\/7926947\/07927236.pdf?arnumber=7927236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T13:37:58Z","timestamp":1569332278000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7927236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/date.2017.7927236","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}