{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:59:38Z","timestamp":1729677578590,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/srds.2010.38","type":"proceedings-article","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T16:53:15Z","timestamp":1290012795000},"page":"72-81","source":"Crossref","is-referenced-by-count":20,"title":["VMDriver: A Driver-Based Monitoring Mechanism for Virtualization"],"prefix":"10.1109","author":[{"given":"Guofu","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sha","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Secure Observation of Kernel Behavior","author":"srivastava","year":"2008","journal-title":"Technical report Georgia Institute of Technology"},{"journal-title":"VMsafe Homepage","year":"0","key":"17"},{"key":"22","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion Detection using Sequences of System Calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"year":"0","key":"23"},{"journal-title":"VMWare Homepage","year":"0","key":"15"},{"year":"0","key":"24"},{"journal-title":"Virtual PC Homepage","year":"0","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/978-3-642-04342-0_16","article-title":"Toward Revealing Kernel Malware Behavior in Virtual Execution Environments","author":"xuan","year":"2009","journal-title":"Proc 5th Int Symp Recent Advances in Intrusion Detection"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"12","article-title":"K-Tracer: A System for Extracting Kernel Malware Behavior","author":"lanzi","year":"0","journal-title":"Proceedings of the 16th Annual Network and Distributed System Security Symposium 2009"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.176"},{"journal-title":"Linux Device Drivers","year":"2005","author":"corbet","key":"21"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.173"},{"journal-title":"Understanding the Linux Kernel","year":"2005","author":"bovet","key":"20"},{"key":"10","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/1315245.1315262","article-title":"Stealthy Malware Detection through VMM-Based Out-of-the-Box Semantic View Reconstruction","author":"jiang","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"journal-title":"A Survey on Virtualization Technologies","year":"2005","author":"nanda","key":"1"},{"key":"7","first-page":"191","article-title":"A Virtual Machine Introspection based Architecture for Intrusion Detection","author":"garfinkel","year":"2003","journal-title":"Proceedings of the 10th Network and Distributed System Symposium"},{"key":"6","first-page":"65","article-title":"Xen 3.0 and the Art of Virtualization","author":"pratt","year":"2005","journal-title":"Proceedings of the 2005 Linux Symposium"},{"key":"5","first-page":"135","article-title":"Xen and the Art of Repeated Research","author":"clark","year":"2004","journal-title":"Proceedings of the 2004 USENIX Annual Technical Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346269"},{"key":"8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/978-3-540-74320-0_11","article-title":"Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots","author":"jiang","year":"2007","journal-title":"Proc 5th Int Symp Recent Advances in Intrusion Detection"}],"event":{"name":"2010 IEEE International Symposium on Reliable Distributed Systems (SRDS)","start":{"date-parts":[[2010,10,31]]},"location":"New Delhi, Punjab India","end":{"date-parts":[[2010,11,3]]}},"container-title":["2010 29th IEEE Symposium on Reliable Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5623378\/5623379\/05623381.pdf?arnumber=5623381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T06:20:08Z","timestamp":1559802008000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5623381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/srds.2010.38","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}