{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:20:16Z","timestamp":1725578416910},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006751","name":"U.S. Army STTR","doi-asserted-by":"publisher","award":["W56KGU-16-C-0064,W56KGU-17-C-0077"],"id":[{"id":"10.13039\/100006751","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9653063","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"309-315","source":"Crossref","is-referenced-by-count":0,"title":["CloudImmu: Transparent Protection of Binary Applications in the Cloud"],"prefix":"10.1109","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2731186.2731199"},{"key":"ref31","first-page":"243","article-title":"Hypervisor Support for Identifying Covertly Executing Binaries","author":"litty","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref30","article-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity","author":"carlini","year":"2015","journal-title":"Proceedings of the 24th USENIX Security Symposium"},{"journal-title":"Top 6 Free Network Intrusion Detection Systems (NIDS) Software in 2020","year":"2020","author":"team","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199328"},{"key":"ref15","article-title":"Artificial Malware Immunization based on Dynamically Assigned Sense of Self","author":"wang","year":"2010","journal-title":"Proceedings of the 13th Information Security Conference (ISC 2010)"},{"key":"ref16","first-page":"340","article-title":"Control-Flow Integrity: Principles, Implementations, and Applications","author":"abadi","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"ref18","article-title":"Control Flow Integrity for COTS Binaries","author":"zhang","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664249"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"journal-title":"Cloud provider stopped ransomware attack but had to pay ransom demand anyway","year":"2020","author":"cimpanu","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"journal-title":"Report Cloud Security Breaches Surpass On-Prem Ones for the First Time","year":"2021","author":"korolov","key":"ref3"},{"journal-title":"Why Linux runs 90 percent of the public cloud workload","year":"2018","author":"nuggets","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"journal-title":"Kernel-based virtual machine for linux","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_11"},{"journal-title":"Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification","year":"1995","author":"committee","key":"ref7"},{"journal-title":"Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months","year":"2020","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"journal-title":"Gartner Forecasts Worldwide Public Cloud End-User Spending to Grow 23% in 2021","year":"2021","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23099"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09653063.pdf?arnumber=9653063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:03Z","timestamp":1652202003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9653063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9653063","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}