{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:41:40Z","timestamp":1725428500336},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/trustcom.2012.35","type":"proceedings-article","created":{"date-parts":[[2012,9,11]],"date-time":"2012-09-11T22:46:34Z","timestamp":1347403594000},"page":"1259-1264","source":"Crossref","is-referenced-by-count":1,"title":["A Layered Malware Detection Model Using VMM"],"prefix":"10.1109","author":[{"given":"Lin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huaping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qianbing","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/SP.2008.24"},{"key":"2","first-page":"1","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","author":"garfinkel","year":"0","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS'03) San Diego California USA 2003"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/945461.945462"},{"key":"1","article-title":"Stealthy malware detection through vmm-based \"out-of-the-box\" semantic view reconstruction","author":"jiang","year":"0","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security 2007"},{"key":"7","article-title":"Control-flow integrity","author":"abadi","year":"0","journal-title":"Proceedings of the ACM Conference on Computer and Communication Security (CCS) 2005"},{"key":"6","article-title":"Hypervisor Support for Identifying Covertly Executing Binaries","author":"litty","year":"0","journal-title":"Security '08 Proceedings of the 17th USENIX Security Symposium 2008"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1653662.1653720"},{"year":"2010","author":"payne","journal-title":"Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/800122.803950"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1653662.1653728"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1508293.1508311"},{"key":"12","first-page":"41","article-title":"QEMU, a Fast and Portable Dynamic Translator","author":"bellard","year":"0","journal-title":"Proceedings of the USENIX Annual Technical Conference (USENIX'05) Marriott Anaheim Anaheim CA 2005"}],"event":{"name":"2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2012,6,25]]},"location":"Liverpool, United Kingdom","end":{"date-parts":[[2012,6,27]]}},"container-title":["2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294581\/6295938\/06296123.pdf?arnumber=6296123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:06:39Z","timestamp":1490130399000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6296123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2012.35","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}