2022-04-27 21:59:56 -04:00
|
|
|
% $ biblatex auxiliary file $
|
|
|
|
|
% $ biblatex bbl format version 3.1 $
|
|
|
|
|
% Do not modify the above lines!
|
|
|
|
|
%
|
|
|
|
|
% This is an auxiliary file used by the 'biblatex' package.
|
|
|
|
|
% This file may safely be deleted. It will be recreated by
|
|
|
|
|
% biber as required.
|
|
|
|
|
%
|
|
|
|
|
\begingroup
|
|
|
|
|
\makeatletter
|
|
|
|
|
\@ifundefined{ver@biblatex.sty}
|
|
|
|
|
{\@latex@error
|
|
|
|
|
{Missing 'biblatex' package}
|
|
|
|
|
{The bibliography requires the 'biblatex' package.}
|
|
|
|
|
\aftergroup\endinput}
|
|
|
|
|
{}
|
|
|
|
|
\endgroup
|
|
|
|
|
|
2022-05-20 21:20:24 -04:00
|
|
|
|
|
|
|
|
\refsection{0}
|
|
|
|
|
\datalist[entry]{none/global//global/global}
|
|
|
|
|
\entry{ransomware_pwc}{report}{}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{PricewaterhouseCoopers}%
|
|
|
|
|
}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{2}
|
|
|
|
|
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
2022-05-20 21:20:24 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{title}{Cyber Threats 2021: A year in Retrospect}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{rootkit_ptsecurity}{report}{}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Positive Technologies}%
|
|
|
|
|
}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{3}
|
|
|
|
|
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
2022-05-20 21:20:24 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{3}
|
|
|
|
|
\field{month}{11}
|
|
|
|
|
\field{title}{Rootkits: evolution and detection methods}
|
|
|
|
|
\field{year}{2021}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-20 22:58:33 -04:00
|
|
|
\entry{ebpf_linux318}{online}{}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{4}
|
|
|
|
|
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
2022-05-20 22:58:33 -04:00
|
|
|
\field{day}{7}
|
|
|
|
|
\field{indextitle}{eBPF incorporation in the Linux Kernel 3.18}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{year}{2014}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://kernelnewbies.org/Linux_3.18
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://kernelnewbies.org/Linux_3.18
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bvp47_report}{report}{}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Pangu Lab}%
|
|
|
|
|
}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{5}
|
|
|
|
|
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
2022-05-20 22:58:33 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{23}
|
|
|
|
|
\field{month}{2}
|
|
|
|
|
\field{title}{Bvp47 Top-tier Backdoor of US NSA Equation Group}
|
|
|
|
|
\field{year}{2022}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bpfdoor_pwc}{report}{}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{PricewaterhouseCoopers}%
|
|
|
|
|
}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{6}
|
|
|
|
|
\field{sortinithash}{7851c86048328b027313775d8fbd2131}
|
2022-05-20 22:58:33 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{title}{Cyber Threats 2021: A year in Retrospect}
|
|
|
|
|
\field{pages}{37}
|
|
|
|
|
\range{pages}{1}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-21 16:56:05 -04:00
|
|
|
\entry{ebpf_windows}{online}{}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{7}
|
|
|
|
|
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
2022-05-21 16:56:05 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{7}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{eBPF incorporation in the Linux Kernel 3.18}
|
|
|
|
|
\field{year}{2014}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://kernelnewbies.org/Linux_3.18
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://kernelnewbies.org/Linux_3.18
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{ebpf_android}{online}{}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{8}
|
|
|
|
|
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
2022-05-21 16:56:05 -04:00
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{title}{eBPF for Windows}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://source.android.com/devices/architecture/kernel/bpf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://source.android.com/devices/architecture/kernel/bpf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-20 22:58:33 -04:00
|
|
|
\entry{evil_ebpf}{proceedings}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
|
|
|
|
|
family={Dileo},
|
|
|
|
|
familyi={D\bibinitperiod},
|
|
|
|
|
given={Jeff},
|
|
|
|
|
giveni={J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{NCC Group}%
|
|
|
|
|
}
|
|
|
|
|
\list{organization}{1}{%
|
|
|
|
|
{DEFCON 27}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
|
|
|
|
|
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
|
|
|
|
|
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
|
|
|
|
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
|
|
|
|
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
|
|
|
|
|
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{9}
|
|
|
|
|
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
2022-05-20 22:58:33 -04:00
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-21 16:56:05 -04:00
|
|
|
\entry{bad_ebpf}{online}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=53d4d4da0d1a82f58d57d86ba9635f2c}{%
|
|
|
|
|
family={Hogan},
|
|
|
|
|
familyi={H\bibinitperiod},
|
|
|
|
|
given={Pat},
|
|
|
|
|
giveni={P\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{organization}{1}{%
|
|
|
|
|
{DEFCON 27}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
|
|
|
|
\strng{fullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
|
|
|
|
\strng{bibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
|
|
|
|
\strng{authorbibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
|
|
|
|
\strng{authornamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
|
|
|
|
\strng{authorfullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
2022-05-23 06:17:21 -04:00
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
2022-05-21 16:56:05 -04:00
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{eventtitle}{Bad BPF - Warping reality using eBPF}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-20 22:58:33 -04:00
|
|
|
\entry{ebpf_friends}{proceedings}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=2994fc802c0b46f7289cf001e2c26cfe}{%
|
|
|
|
|
family={Guillaume\bibnamedelima Fournier},
|
|
|
|
|
familyi={G\bibinitperiod\bibinitdelim F\bibinitperiod},
|
|
|
|
|
given={Sylvain\bibnamedelima Afchainthe},
|
|
|
|
|
giveni={S\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Datadog}%
|
|
|
|
|
}
|
|
|
|
|
\list{organization}{1}{%
|
|
|
|
|
{DEFCON 29}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
|
|
|
|
\strng{fullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
|
|
|
|
\strng{bibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
|
|
|
|
\strng{authorbibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
|
|
|
|
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
|
|
|
|
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
2022-05-21 16:56:05 -04:00
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
2022-05-20 22:58:33 -04:00
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-22 19:57:47 -04:00
|
|
|
\entry{ebpf_io}{manual}{}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{title}{eBPF Documentation}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://ebpf.io/what-is-ebpf/
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://ebpf.io/what-is-ebpf/
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-22 08:19:32 -04:00
|
|
|
\entry{bpf_bsd_origin}{article}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
|
|
|
|
family={Steven\bibnamedelima McCanne},
|
|
|
|
|
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
|
|
|
|
given={Van\bibnamedelima Jacobson},
|
|
|
|
|
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Lawrence Berkeley Laboratory}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
2022-05-22 19:57:47 -04:00
|
|
|
\field{extraname}{1}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{19}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
|
|
|
|
\field{year}{1992}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{ebpf_history_opensource}{online}{}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{11}
|
|
|
|
|
\field{month}{8}
|
|
|
|
|
\field{title}{An intro to using eBPF to filter packets in the Linux kernel}
|
|
|
|
|
\field{year}{2017}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://opensource.com/article/17/9/intro-ebpf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://opensource.com/article/17/9/intro-ebpf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bpf_bsd_origin_bpf_page1}{article}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
|
|
|
|
family={Steven\bibnamedelima McCanne},
|
|
|
|
|
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
|
|
|
|
given={Van\bibnamedelima Jacobson},
|
|
|
|
|
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Lawrence Berkeley Laboratory}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\field{extraname}{2}
|
2022-05-22 08:19:32 -04:00
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{19}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
|
|
|
|
\field{year}{1992}
|
|
|
|
|
\field{dateera}{ce}
|
2022-05-22 19:57:47 -04:00
|
|
|
\field{pages}{1}
|
|
|
|
|
\range{pages}{1}
|
2022-05-22 08:19:32 -04:00
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-22 19:57:47 -04:00
|
|
|
\entry{index_register}{manual}{}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{title}{Index register}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://gunkies.org/wiki/Index_register
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://gunkies.org/wiki/Index_register
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-23 06:17:21 -04:00
|
|
|
\entry{bpf_bsd_origin_bpf_page5}{article}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
|
|
|
|
family={Steven\bibnamedelima McCanne},
|
|
|
|
|
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
|
|
|
|
given={Van\bibnamedelima Jacobson},
|
|
|
|
|
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Lawrence Berkeley Laboratory}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\field{extraname}{3}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{19}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
|
|
|
|
\field{year}{1992}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\field{pages}{5}
|
|
|
|
|
\range{pages}{1}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bpf_organicprogrammer_analysis}{online}{}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{28}
|
|
|
|
|
\field{month}{3}
|
|
|
|
|
\field{title}{Write a Linux packet sniffer from scratch: part two- BPF}
|
|
|
|
|
\field{year}{2022}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bpf_bsd_origin_bpf_page7}{article}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
|
|
|
|
family={Steven\bibnamedelima McCanne},
|
|
|
|
|
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
|
|
|
|
given={Van\bibnamedelima Jacobson},
|
|
|
|
|
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Lawrence Berkeley Laboratory}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\field{extraname}{4}
|
|
|
|
|
\field{sortinit}{1}
|
|
|
|
|
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
|
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{19}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
|
|
|
|
\field{year}{1992}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\field{pages}{7}
|
|
|
|
|
\range{pages}{1}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
|
|
|
|
\entry{bpf_bsd_origin_bpf_page8}{article}{}
|
|
|
|
|
\name{author}{1}{}{%
|
|
|
|
|
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
|
|
|
|
family={Steven\bibnamedelima McCanne},
|
|
|
|
|
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
|
|
|
|
given={Van\bibnamedelima Jacobson},
|
|
|
|
|
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
|
|
|
|
}
|
|
|
|
|
\list{institution}{1}{%
|
|
|
|
|
{Lawrence Berkeley Laboratory}%
|
|
|
|
|
}
|
|
|
|
|
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
|
|
|
|
\field{extraname}{5}
|
|
|
|
|
\field{sortinit}{2}
|
|
|
|
|
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
|
|
|
|
\field{labelnamesource}{author}
|
|
|
|
|
\field{labeltitlesource}{title}
|
|
|
|
|
\field{day}{19}
|
|
|
|
|
\field{month}{12}
|
|
|
|
|
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
|
|
|
|
\field{year}{1992}
|
|
|
|
|
\field{dateera}{ce}
|
|
|
|
|
\field{pages}{8}
|
|
|
|
|
\range{pages}{1}
|
|
|
|
|
\verb{urlraw}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\verb{url}
|
|
|
|
|
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
|
|
|
|
\endverb
|
|
|
|
|
\endentry
|
2022-05-20 21:20:24 -04:00
|
|
|
\enddatalist
|
|
|
|
|
\endrefsection
|
2022-04-27 21:59:56 -04:00
|
|
|
\endinput
|
|
|
|
|
|