{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:31:27Z","timestamp":1730316687596,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484343","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T08:15:27Z","timestamp":1368519327000},"page":"231-242","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An empirical study on the software integrity of virtual appliances"],"prefix":"10.1145","author":[{"given":"Jun Ho","family":"Huh","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Mirko","family":"Montanari","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Derek","family":"Dagit","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Dong Wook","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Yoonjoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon Elastic Compute Cloud. http:\/\/aws.amazon.com\/ec2\/. Amazon Elastic Compute Cloud. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Machine Images (AMIs). http:\/\/aws.amazon.com\/amis. Amazon Machine Images (AMIs). http:\/\/aws.amazon.com\/amis."},{"key":"e_1_3_2_1_3_1","unstructured":"Bit9 Global Software Registry. http:\/\/www.bit9.com\/products\/bit9-global-software-registry.php. Bit9 Global Software Registry. http:\/\/www.bit9.com\/products\/bit9-global-software-registry.php."},{"key":"e_1_3_2_1_4_1","unstructured":"BitNami Virtual Images. http:\/\/bitnami.org\/learn_more\/virtual_machines. BitNami Virtual Images. http:\/\/bitnami.org\/learn_more\/virtual_machines."},{"key":"e_1_3_2_1_5_1","unstructured":"CUBRID Virtual Images. http:\/\/www.cubrid.org\/virtual_machine_images. CUBRID Virtual Images. http:\/\/www.cubrid.org\/virtual_machine_images."},{"key":"e_1_3_2_1_6_1","unstructured":"IBM SmartCloud. IBM SmartCloud."},{"key":"e_1_3_2_1_7_1","unstructured":"NIST National Software Reference Library. http:\/\/www.nsrl.nist.gov\/. NIST National Software Reference Library. http:\/\/www.nsrl.nist.gov\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Thunderflash Pre-Built Virtual Images. http:\/\/thunderflash.com\/. Thunderflash Pre-Built Virtual Images. http:\/\/thunderflash.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Virustotal. https:\/\/www.virustotal.com\/. Virustotal. https:\/\/www.virustotal.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"VMWare Solution Exchange. https:\/\/solutionexchange.vmware.com\/. VMWare Solution Exchange. https:\/\/solutionexchange.vmware.com\/."},{"key":"e_1_3_2_1_11_1","volume-title":"April","author":"Critical Security Guidance","year":"2009","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing . http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.pdf , April 2009 . Security Guidance for Critical Areas of Focus in Cloud Computing. http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.pdf, April 2009."},{"key":"e_1_3_2_1_12_1","volume-title":"August","author":"Performance Statistics AntiVirus","year":"2012","unstructured":"AntiVirus Performance Statistics . http:\/\/winnow.oitc.com\/malewarestats.php , August 2012 . AntiVirus Performance Statistics. http:\/\/winnow.oitc.com\/malewarestats.php, August 2012."},{"key":"e_1_3_2_1_13_1","first-page":"22","volume-title":"Proceedings of the 3rd USENIX conference on Hot topics in cloud computing, HotCloud'11","author":"Ammons G.","year":"2011","unstructured":"G. Ammons , V. Bala , T. Mummert , D. Reimer , and X. Zhang . Virtual machine images as structured data: the mirage image library . In Proceedings of the 3rd USENIX conference on Hot topics in cloud computing, HotCloud'11 , pages 22 -- 22 , Berkeley, CA, USA , 2011 . USENIX Association. G. Ammons, V. Bala, T. Mummert, D. Reimer, and X. Zhang. Virtual machine images as structured data: the mirage image library. In Proceedings of the 3rd USENIX conference on Hot topics in cloud computing, HotCloud'11, pages 22--22, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046766"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046753"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076759"},{"key":"e_1_3_2_1_19_1","first-page":"20","volume-title":"Proceedings of the 10th conference on Hot Topics in Operating Systems -","volume":"10","author":"Garfinkel T.","year":"2005","unstructured":"T. Garfinkel and M. Rosenblum . When virtual is harder than real: security challenges in virtual machine based computing environments . In Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10 , HOTOS'05, pages 20 -- 20 , Berkeley, CA, USA , 2005 . USENIX Association. T. Garfinkel and M. Rosenblum. When virtual is harder than real: security challenges in virtual machine based computing environments. In Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, HOTOS'05, pages 20--20, Berkeley, CA, USA, 2005. USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046589"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090181.2090187"},{"key":"e_1_3_2_1_22_1","first-page":"365","volume-title":"Mathematical Statistics and Data Analysis","author":"Rice John A.","unstructured":"John A. Rice . Mathematical Statistics and Data Analysis , chapter 10, page 365 . Duxbury Press, 2 edition, 1994. John A. Rice. Mathematical Statistics and Data Analysis, chapter 10, page 365. Duxbury Press, 2 edition, 1994."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.20"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229313"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346272"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_28_1","volume-title":"When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography","author":"Ristenpart T.","year":"2010","unstructured":"T. Ristenpart and S. Yilek . When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography . In NDSS. The Internet Society , 2010 . T. Ristenpart and S. Yilek. When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. In NDSS. The Internet Society, 2010."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_3_2_1_30_1","unstructured":"TCG. TCG Infrastructure Working Group Architecture Part II - Integrity Management. http:\/\/www.trustedcomputinggroup.org\/resources\/infrastructure_work_group_architecture_part_ii_integrity_management_version_10 November 2006. TCG. TCG Infrastructure Working Group Architecture Part II - Integrity Management. http:\/\/www.trustedcomputinggroup.org\/resources\/infrastructure_work_group_architecture_part_ii_integrity_management_version_10 November 2006."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Fourth {USENIX} Security Symposium","author":"Vincenzetti D.","year":"1993","unstructured":"D. Vincenzetti and M. Cotrozzi . Anti tampering program . In Proceedings of the Fourth {USENIX} Security Symposium , Santa Clara, CA. USENIX , 1993 . D. Vincenzetti and M. Cotrozzi. Anti tampering program. In Proceedings of the Fourth {USENIX} Security Symposium, Santa Clara, CA. USENIX, 1993."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920317"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hangzhou China","acronym":"ASIA CCS '13"},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:36:54Z","timestamp":1673224614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484343"}},"subtitle":["are you really getting what you paid for?"],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":34,"alternative-id":["10.1145\/2484313.2484343","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484343","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}