{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:54:27Z","timestamp":1775271267753,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845309"],"award-info":[{"award-number":["CNS-0845309"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2420950.2421012","type":"proceedings-article","created":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T14:12:22Z","timestamp":1355926342000},"page":"429-438","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Efficient protection of kernel data structures via object partitioning"],"prefix":"10.1145","author":[{"given":"Abhinav","family":"Srivastava","sequence":"first","affiliation":[{"name":"AT&amp;T Labs-Research"}]},{"given":"Jonathon","family":"Giffin","sequence":"additional","affiliation":[{"name":"HP Fortify"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Branch Tracing with Intel MSR Registers. http:\/\/www.openrce.org\/blog\/view\/535\/Branch_Tracing_with_Intel_MSR_Registers. Last Accessed Sep. 15 2012.  Branch Tracing with Intel MSR Registers. http:\/\/www.openrce.org\/blog\/view\/535\/Branch_Tracing_with_Intel_MSR_Registers. Last Accessed Sep. 15 2012."},{"key":"e_1_3_2_1_2_1","unstructured":"New for Kernel-Mode Driver Architecture. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/hh439748%28v=vs.85%29.aspx. Last Accessed Sep. 15 2012.  New for Kernel-Mode Driver Architecture. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/hh439748%28v=vs.85%29.aspx. Last Accessed Sep. 15 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"Last Accessed","year":"2012"},{"key":"e_1_3_2_1_4_1","unstructured":"Windows ISV Software Security Defenses. http:\/\/msdn.microsoft.com\/en-us\/library\/bb430720. Last Accessed Sep. 15 2012.  Windows ISV Software Security Defenses. http:\/\/msdn.microsoft.com\/en-us\/library\/bb430720. Last Accessed Sep. 15 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168860"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI","author":"Ben-Yahuda M.","year":"2010"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX","author":"Bonwick J.","year":"1994"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463891.1463912"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_15_1","volume-title":"OSDI","author":"Abadi M.","year":"2006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS","author":"Garfinkel T.","year":"2003"},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. System Programming Guide: Part 2. Intel 64 and IA-32 Architectures Software Developer's Manual 2004.  Intel. System Programming Guide: Part 2 . Intel 64 and IA-32 Architectures Software Developer's Manual 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346269"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium","author":"Litty L.","year":"2008"},{"key":"e_1_3_2_1_23_1","unstructured":"Microsoft. PatchGuard. http:\/\/blogs.msdn.com\/windowsvistasecurity\/archive\/2006\/08\/11\/695993.aspx. Last accessed Sep. 15 2012.  Microsoft. PatchGuard. http:\/\/blogs.msdn.com\/windowsvistasecurity\/archive\/2006\/08\/11\/695993.aspx. Last accessed Sep. 15 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/647478.727796"},{"key":"e_1_3_2_1_25_1","unstructured":"Packet Storm. All-root. http:\/\/packetstormsecurity.org\/UNIX\/penetration\/rootkits\/all-root.c. Last accessed Sep. 15 2012.  Packet Storm. All-root. http:\/\/packetstormsecurity.org\/UNIX\/penetration\/rootkits\/all-root.c. Last accessed Sep. 15 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium","author":"Petroni N. L.","year":"2006"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433008"},{"key":"e_1_3_2_1_31_1","volume-title":"Black Hat USA","author":"Rutkowska J.","year":"2006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985935"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894175"},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS","author":"Srivastava A.","year":"2011"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2026647.2026665"},{"key":"e_1_3_2_1_39_1","unstructured":"Symantec. Windows rootkit overview. http:\/\/www.symantec.com\/avcenter\/reference\/windows.rootkit.overview.pdf. Last accessed Sep. 15 2012.  Symantec. Windows rootkit overview. http:\/\/www.symantec.com\/avcenter\/reference\/windows.rootkit.overview.pdf. Last accessed Sep. 15 2012."},{"key":"e_1_3_2_1_40_1","unstructured":"ubra. Process hiding and the Linux scheduler. Phrack 11(63) Jan. 2005.  ubra. Process hiding and the Linux scheduler. Phrack 11(63) Jan. 2005."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_43_1","volume-title":"NDSS","author":"Xiong X.","year":"2011"}],"event":{"name":"ACSAC '12: Annual Computer Security Applications Conference","location":"Orlando Florida USA","acronym":"ACSAC '12","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 28th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2420950.2421012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:33Z","timestamp":1750234713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":42,"alternative-id":["10.1145\/2420950.2421012","10.1145\/2420950"],"URL":"https:\/\/doi.org\/10.1145\/2420950.2421012","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}