{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:36:57Z","timestamp":1773653817084,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.3103\/s0146411617080144","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T06:51:40Z","timestamp":1519887100000},"page":"829-834","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Hierarchical approach to analyzing security breaches in information systems"],"prefix":"10.3103","volume":"51","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"6620_CR1","unstructured":"Kaspersky Security Bulletin 2015. https:\/\/securelist.com\/files\/2015\/12\/Kaspersky-Security-Bulletin-2015_ FINAL_EN.pdf."},{"key":"6620_CR2","unstructured":"Kasslin, K. and Lumpur, K., Kernel malware: The attack from within. http:\/\/nicolascormier.com\/documentation\/security\/kasslin_kernel_malware_paper.pdf."},{"key":"6620_CR3","unstructured":"A Technical Breakdown of ModPOS. https:\/\/breakingmalware.com\/malware\/a-technical-breakdown-ofmodpos."},{"key":"6620_CR4","volume-title":"Proc. of the Tenth ACM SIGOPS European Workshop","author":"X. Zhang","year":"2002","unstructured":"Zhang, X., van Doorn, L., Jaeger, T., Perez, R., and Sailer, R., Secure coprocessor-based intrusion detection, Proc. of the Tenth ACM SIGOPS European Workshop, 2002."},{"key":"6620_CR5","volume-title":"Proc. of the 13th Conference on USENIX Security Symposium","author":"N. Petroni","year":"2004","unstructured":"Petroni, N. and Fraser, T., Copilot\u2013a coprocessor-based kernel runtime integrity monitor, Proc. of the 13th Conference on USENIX Security Symposium, 2004."},{"key":"6620_CR6","unstructured":"VMware vShield Endpoint. http:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/ru\/pdf\/VMwarevShield-Endpoint-Datasheet.pdf."},{"key":"6620_CR7","volume-title":"Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA","author":"J. Rutkowska","year":"2006","unstructured":"Rutkowska, J., Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, 2006. http:\/\/blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Rutkowska.pdf."},{"key":"6620_CR8","volume-title":"Proc. of the 4th International Conference on Security and Privacy in Communication Networks","author":"S. Embleton","year":"2008","unstructured":"Embleton, S., Sparks, S., and Zou, C., SMM rootkits: A new breed of OS independent malware, Proc. of the 4th International Conference on Security and Privacy in Communication Networks, 2008."},{"key":"6620_CR9","volume-title":"Presented at Black Hat USA","author":"K. Nohl","year":"2014","unstructured":"Nohl, K., Kribler, S., and Lell, J., BadUSB\u2013On accessories that turn evil, Presented at Black Hat USA, 2014. https:\/\/srlabs.de\/wp-content\/uploads\/2014\/07\/SRLabs-BadUSB-BlackHat-v1.pdf."},{"key":"6620_CR10","volume-title":"Proc. of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats","author":"S.T. King","year":"2008","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., and Zhou, Y., Designing and implementation malicious hardware, Proc. of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats, 2008."},{"key":"6620_CR11","first-page":"197","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems","author":"G.T. Becker","year":"2013","unstructured":"Becker, G.T., Regazzoni, F., Paar, C., and Burleson, W.P., International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2013, pp. 197\u2013214."},{"key":"6620_CR12","unstructured":"Zammit, D., Intel x86s hide another CPU that can take over your machine. https:\/\/boingboing.net\/2016\/06\/15\/intel-x86-processors-ship-with.html."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617080144","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080144.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617080144.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:23Z","timestamp":1773611783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617080144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["6620"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617080144","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"1 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}