{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:27:52Z","timestamp":1725560872911},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/soca.2009.5410456","type":"proceedings-article","created":{"date-parts":[[2010,2,16]],"date-time":"2010-02-16T11:08:22Z","timestamp":1266318502000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Reusable integrity management services for embedded systems"],"prefix":"10.1109","author":[{"given":"Lei","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hiromasa","family":"Shimada","sequence":"additional","affiliation":[]},{"given":"Tatsuo","family":"Nakajima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"368","article-title":"Detecting Stealth Software with Strider Ghostbuster","author":"wang","year":"2005","journal-title":"Proc of the 35th IEEE International Conference on Dependable Systems and Networks (DSN)"},{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"2005","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.29"},{"journal-title":"Knark Linux Kernel Subversion","year":"0","author":"collins","key":"ref16"},{"key":"ref17","first-page":"191","article-title":"A Virtual Machine Intro-spection based Architecture for Intrusion Detection","author":"garfinkel","year":"2003","journal-title":"Proc 12th Ann Network and Distributed Systems Security Symp (NDSS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435461"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.23"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2008.16"},{"year":"0","key":"ref4"},{"key":"ref27","first-page":"179","article-title":"Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor","author":"petroni","year":"2004","journal-title":"Proc of the 13th USENIX Security Symposium"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"journal-title":"SH-4A Software Manual 1 50 edition Renesas Technology","year":"2004","author":"technology","key":"ref29"},{"journal-title":"The State of Cell Phone Malware in","year":"2007","author":"hypponen","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"year":"0","key":"ref1"},{"key":"ref20","first-page":"289","article-title":"An Architecture for Specification-based Detection of Semantic Integrity Violations in Kernel Dynamic Data","year":"2006","journal-title":"Proc of the 15th USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012428"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.157"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"journal-title":"Mechanisms for Protecting Software Integrity in Networked Systems","year":"2008","author":"kil","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-45937-5_16","article-title":"CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs","author":"necula","year":"2002","journal-title":"Proc of the 11th International Conference on Compiler Construction"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945467"}],"event":{"name":"2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)","start":{"date-parts":[[2009,1,14]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,1,15]]}},"container-title":["2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5375734\/5410249\/05410456.pdf?arnumber=5410456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T20:23:22Z","timestamp":1558815802000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5410456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/soca.2009.5410456","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}