{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:52:55Z","timestamp":1725655975967},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0627318"],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533076","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"125-134","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A chipset level network backdoor"],"prefix":"10.1145","author":[{"given":"Sherri","family":"Sparks","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Shawn","family":"Embleton","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Cliff C.","family":"Zou","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3B: System Programming Guide Part 2. May 2007. Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3B: System Programming Guide Part 2. May 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3A: System Programming Guide Part 1. May 2007. Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3A: System Programming Guide Part 1. May 2007."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel Corporation. Intel 8255x 10\/100 Mbps Ethernet Controller Family: Open Source Software Developer Manual January 2006. Intel Corporation. Intel 8255x 10\/100 Mbps Ethernet Controller Family: Open Source Software Developer Manual January 2006."},{"key":"e_1_3_2_1_4_1","unstructured":"R. Bejtlich. Extrusion Detection: Security Monitoring for Internal Intrusions. AddisonWesley first edition 2006. R. Bejtlich. Extrusion Detection: Security Monitoring for Internal Intrusions. AddisonWesley first edition 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Joanna Rutkowska. \"Rootkits vs. Stealth by Design Malware\" Presented at Black Hat Europe 2006. Joanna Rutkowska. \"Rootkits vs. Stealth by Design Malware\" Presented at Black Hat Europe 2006."},{"volume-title":"Black Hat USA","year":"2006","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Windows XP Firewall. http:\/\/www.microsoft.com\/windowsxp\/using\/networking\/sec urity\/winfirewall.mspx Windows XP Firewall. http:\/\/www.microsoft.com\/windowsxp\/using\/networking\/sec urity\/winfirewall.mspx"},{"key":"e_1_3_2_1_8_1","unstructured":"Zone Alarm. http:\/\/www.zonealarm.com\/store\/content\/home.jsp Zone Alarm. http:\/\/www.zonealarm.com\/store\/content\/home.jsp"},{"key":"e_1_3_2_1_9_1","unstructured":"Snort. http:\/\/www.snort.org\/ Snort. http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"AOL\/NCSA Online Safety Study. Conducted by America Online and the National Cyber Security Alliance. Dec. 2005. AOL\/NCSA Online Safety Study. Conducted by America Online and the National Cyber Security Alliance. Dec. 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"Microsoft Corporation. Windows XP Firewall. Microsoft Corporation. Windows XP Firewall."},{"key":"e_1_3_2_1_12_1","unstructured":"Chipset. http:\/\/en.wikipedia.org\/wiki\/Chipset Chipset. http:\/\/en.wikipedia.org\/wiki\/Chipset"},{"key":"e_1_3_2_1_13_1","unstructured":"Gramm-Leach Bliley Act. http:\/\/www.ftc.gov\/privacy\/privacyinitiatives\/glbact.html Gramm-Leach Bliley Act. http:\/\/www.ftc.gov\/privacy\/privacyinitiatives\/glbact.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Payment Card Industry Data Security Standard. https:\/\/www.pcisecuritystandards.org\/ Payment Card Industry Data Security Standard. https:\/\/www.pcisecuritystandards.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Bulter and G. Hoglund. \"Rootkits: Subverting the Windows Kernel.\" Addison Wesley. 2005. J. Bulter and G. Hoglund. \"Rootkits: Subverting the Windows Kernel.\" Addison Wesley. 2005."},{"volume-title":"BINDER: An Extrusion-based Break-In Detector for Personal Computers. In 2005 USENIX Annual Technical Conference.","year":"2005","author":"Cui W.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Salvador Mandujano. \"Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID.\" In Proceedings of the World Academy of Science Engineering and Technology June 2005. Salvador Mandujano. \"Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID.\" In Proceedings of the World Academy of Science Engineering and Technology June 2005."},{"key":"e_1_3_2_1_18_1","unstructured":"F. Bellifemine A. Poggi and G. Rimassa. \"JADE --- A FIPA-compliant agent framework.\" In Proceedings of Practical Applications of Intelligent Agents 1999. F. Bellifemine A. Poggi and G. Rimassa. \"JADE --- A FIPA-compliant agent framework.\" In Proceedings of Practical Applications of Intelligent Agents 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030100"},{"volume-title":"Proceedings of the 9th USENIX Security Symposium.","year":"2000","author":"Zhang Y.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"NDIS. http:\/\/en.wikipedia.org\/wiki\/Network_Driver_Interface_Specification NDIS. http:\/\/en.wikipedia.org\/wiki\/Network_Driver_Interface_Specification"},{"key":"e_1_3_2_1_22_1","unstructured":"Network Packet Generator. http:\/\/www.wikistc.org\/wiki\/Network_packet_generator Network Packet Generator. http:\/\/www.wikistc.org\/wiki\/Network_packet_generator"},{"volume-title":"Phrack","year":"1999","author":"Rootkit A","key":"e_1_3_2_1_23_1"},{"volume-title":"Black Hat Federal","year":"2006","author":"Heasman J.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"x86 virtualization. http:\/\/en.wikipedia.org\/wiki\/X86_virtualization x86 virtualization. http:\/\/en.wikipedia.org\/wiki\/X86_virtualization"},{"key":"e_1_3_2_1_26_1","unstructured":"Intel\u00ae Virtualization Technology for Directed I\/O. http:\/\/www.intel.com\/technology\/itj\/2006\/v10i3\/2-io\/7-conclusion.htm Intel\u00ae Virtualization Technology for Directed I\/O. http:\/\/www.intel.com\/technology\/itj\/2006\/v10i3\/2-io\/7-conclusion.htm"},{"key":"e_1_3_2_1_27_1","unstructured":"Extrusion detection. http:\/\/en.wikipedia.org\/wiki\/Extrusion_detection Extrusion detection. http:\/\/en.wikipedia.org\/wiki\/Extrusion_detection"},{"key":"e_1_3_2_1_28_1","unstructured":"D. Whyte P. Oorschot E. Kranakis. Exposure Maps: Removing Reliance on Attribution during Scanning Detection. USENIX HotSec 2006. D. Whyte P. Oorschot E. Kranakis. Exposure Maps: Removing Reliance on Attribution during Scanning Detection. USENIX HotSec 2006."},{"key":"e_1_3_2_1_29_1","unstructured":"VMware VMsafe Security Technology. http:\/\/www.vmware.com\/technology\/security\/vmsafe.html VMware VMsafe Security Technology. http:\/\/www.vmware.com\/technology\/security\/vmsafe.html"},{"key":"e_1_3_2_1_30_1","unstructured":"XenAccess Library. http:\/\/code.google.com\/p\/xenaccess\/ XenAccess Library. http:\/\/code.google.com\/p\/xenaccess\/"}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T18:56:25Z","timestamp":1673117785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533076"}},"subtitle":["bypassing host-based firewall & IDS"],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":30,"alternative-id":["10.1145\/1533057.1533076","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533076","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}