{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:22:35Z","timestamp":1730323355274,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3429885.3429961","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T03:59:53Z","timestamp":1610423993000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Filenail"],"prefix":"10.1145","author":[{"given":"Shripad","family":"Nadgowda","sequence":"first","affiliation":[{"name":"IBM TJ Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2021,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267680.1267707"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496684.1496699"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154453"},{"volume-title":"https:\/\/www.cisecurity.org","year":"2014","author":"CIS. Center for internet security.","key":"e_1_3_2_1_4_1"},{"volume-title":"CIS Benchmark Securing Kubernetes. https:\/\/www.cisecurity.org\/benchmark\/kubernetes\/","year":"2017","author":"CIS.","key":"e_1_3_2_1_5_1"},{"volume-title":"agentless-system-crawler: A tool to crawl systems like crawlers for the web. https:\/\/github.com\/cloudviz\/agentless-system-crawler","year":"2017","key":"e_1_3_2_1_6_1"},{"volume-title":"Container data","author":"HQ.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517326.2451534"},{"volume-title":"Mar. 18","year":"2014","author":"Goodman D. P.","key":"e_1_3_2_1_10_1"},{"volume-title":"Using BusyBox (Digital Short Cut). Pearson Education","year":"2006","author":"Hallinan C.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807134"},{"key":"e_1_3_2_1_13_1","unstructured":"IBM. Endpoint manager ibm bigfix. IBM. Endpoint manager ibm bigfix."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2827719.2827729"},{"key":"e_1_3_2_1_15_1","unstructured":"P. Kudva. Mutation advisor in ibm cloud private. URL https:\/\/medium.com\/ibm-cloud\/mutation-advisor-in-ibm-cloud-private-79a8d62ad180. P. Kudva. Mutation advisor in ibm cloud private. URL https:\/\/medium.com\/ibm-cloud\/mutation-advisor-in-ibm-cloud-private-79a8d62ad180."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1349426.1349440"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2006.311843"},{"key":"e_1_3_2_1_18_1","unstructured":"N. Murilo and K. Steding-Jessen. chkrootkit: locally checks for signs of a rootkit. N. Murilo and K. Steding-Jessen. chkrootkit: locally checks for signs of a rootkit."},{"key":"e_1_3_2_1_19_1","first-page":"67","volume-title":"2017 IEEE International Conference on","author":"Nadgowda S.","year":"2017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3275470"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284028.3284031"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45065-5_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.91"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154455"},{"volume-title":"Security compliance. https:\/\/github.com\/OpenSCAP\/openscap","year":"2014","author":"SCAP.","key":"e_1_3_2_1_25_1"},{"issue":"2","key":"e_1_3_2_1_26_1","first-page":"221","article-title":"Plan 9 from bell labs","volume":"8","author":"Pike R.","year":"1995","journal-title":"Computing systems"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611166.2611174"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.36"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00019"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840669"},{"key":"e_1_3_2_1_31_1","unstructured":"Twistlock. Docker security and container security platform. https:\/\/www.twistlock.com\/. Twistlock. Docker security and container security platform. https:\/\/www.twistlock.com\/."},{"key":"e_1_3_2_1_32_1","first-page":"46","article-title":"Achieving compliance with the pci data security standard","volume":"4","author":"Woda A.","year":"2007","journal-title":"Information Systems Control Journal"},{"key":"e_1_3_2_1_33_1","first-page":"915","volume-title":"Proc. 3rd Int. Conf. Mechatron. Ind. Informat","author":"Yang C.","year":"2015"}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 2020 6th International Workshop on Container Technologies and Container Clouds"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429885.3429961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T07:03:46Z","timestamp":1673247826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429885.3429961"}},"subtitle":["Working with Incomplete Filesystem State"],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":33,"alternative-id":["10.1145\/3429885.3429961","10.1145\/3429885"],"URL":"https:\/\/doi.org\/10.1145\/3429885.3429961","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}