{"id":"https://openalex.org/W1528086994","doi":"https://doi.org/10.1007/978-3-642-17650-0_24","title":"Return-Oriented Rootkit without Returns (on the x86)","display_name":"Return-Oriented Rootkit without Returns (on the x86)","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1528086994","doi":"https://doi.org/10.1007/978-3-642-17650-0_24","mag":"1528086994"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-17650-0_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-17650-0_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100400329","display_name":"Ping Chen","orcid":"https://orcid.org/0000-0003-3789-7686"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ping Chen","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiao Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Xing","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089309949","display_name":"Bing Mao","orcid":"https://orcid.org/0000-0001-9943-1473"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Mao","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365450","display_name":"Xie Li","orcid":"https://orcid.org/0000-0002-8307-4640"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xie","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University and Department of Computer Science and Technology, Nanjing University, Nanjing#TAB#","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100400329"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.848,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.72921288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"340","last_page":"354"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.9410674571990967},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.8794432878494263},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8350602388381958},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.6197084188461304},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5359452962875366},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.48042750358581543},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4603441059589386},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4439907371997833},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.42615413665771484},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42588990926742554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3289031684398651},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3169838488101959},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.19694790244102478},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.1386917531490326},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.08467942476272583}],"concepts":[{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.9410674571990967},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.8794432878494263},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8350602388381958},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.6197084188461304},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5359452962875366},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.48042750358581543},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4603441059589386},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4439907371997833},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.42615413665771484},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42588990926742554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3289031684398651},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3169838488101959},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.19694790244102478},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.1386917531490326},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.08467942476272583},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-17650-0_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-17650-0_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W103986934","https://openalex.org/W173413620","https://openalex.org/W1416744215","https://openalex.org/W1515653707","https://openalex.org/W1542906860","https://openalex.org/W1592300071","https://openalex.org/W1641762327","https://openalex.org/W1832558306","https://openalex.org/W1969501726","https://openalex.org/W1982829328","https://openalex.org/W1984187936","https://openalex.org/W1996931407","https://openalex.org/W2027963645","https://openalex.org/W2029224396","https://openalex.org/W2036548030","https://openalex.org/W2099382052","https://openalex.org/W2109219878","https://openalex.org/W2126160338","https://openalex.org/W2141389113","https://openalex.org/W2146431583","https://openalex.org/W2153256720","https://openalex.org/W2162800072","https://openalex.org/W2183964736","https://openalex.org/W4232485878"],"related_works":["https://openalex.org/W2354398839","https://openalex.org/W2483568499","https://openalex.org/W1528086994","https://openalex.org/W1979897749","https://openalex.org/W2297549974","https://openalex.org/W2171038386","https://openalex.org/W1969105756","https://openalex.org/W2371149587","https://openalex.org/W2057555255","https://openalex.org/W2773350783"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
