{"id":"https://openalex.org/W2064915393","doi":"https://doi.org/10.1109/trustcom.2012.35","title":"A Layered Malware Detection Model Using VMM","display_name":"A Layered Malware Detection Model Using VMM","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2064915393","doi":"https://doi.org/10.1109/trustcom.2012.35","mag":"2064915393"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2012.35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100443824","display_name":"Lin Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Chen","raw_affiliation_strings":["Computer School, National University of Defense Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461596","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0001-8140-2279"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["Computer School, National University of Defense Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054424212","display_name":"Huaping Hu","orcid":"https://orcid.org/0000-0002-1651-0385"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaping Hu","raw_affiliation_strings":["Computer School, National University of Defense Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100867587","display_name":"Qianbing Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianbing Zheng","raw_affiliation_strings":["Computer School, National University of Defense Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.627,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.583758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":81},"biblio":{"volume":null,"issue":null,"first_page":"1259","last_page":"1264"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.94980025},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.83768713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8198999},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5565881},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.53735864},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5170046},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4901753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40278068},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.31713337},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2245217},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2012.35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.65,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1522250664","https://openalex.org/W1546317334","https://openalex.org/W1641762327","https://openalex.org/W2106869436","https://openalex.org/W2109219878","https://openalex.org/W2110756602","https://openalex.org/W2112731379","https://openalex.org/W2144006591","https://openalex.org/W2168760272","https://openalex.org/W2303306968","https://openalex.org/W4240429321","https://openalex.org/W4243947286"],"related_works":["https://openalex.org/W2747005099","https://openalex.org/W2743348030","https://openalex.org/W2613320081","https://openalex.org/W2179519055","https://openalex.org/W2148749405","https://openalex.org/W2145292010","https://openalex.org/W2104105430","https://openalex.org/W2086039693","https://openalex.org/W1973516247","https://openalex.org/W1515917392"],"abstract_inverted_index":{"Virtual":[0],"machine":[1],"monitor":[2,79],"(VMM)-based":[3],"anti-malware":[4,24],"systems":[5],"have":[6,54],"recently":[7],"become":[8],"a":[9],"popular":[10],"research":[11],"topic":[12],"in":[13,95,127,152],"finding":[14],"ways":[15],"of":[16,21,43,61,161],"overcoming":[17],"the":[18,55,62,71,76,88,96,109,117,128,137,141,149,153,159,162],"fundamental":[19],"limitations":[20],"traditional":[22],"host-based":[23],"systems,":[25],"which":[26],"are":[27,67],"likely":[28],"to":[29,105,148],"be":[30,124],"deceived":[31],"and":[32,75,82,131,135],"attacked":[33],"by":[34,70],"malicious":[35],"codes.":[36],"This":[37],"paper":[38],"analyzes":[39],"existing":[40],"VMM-based":[41],"models":[42,53],"malware":[44,146],"detection.":[45],"\"Out-of-the-box\"":[46],"detection,":[47],"active":[48],"defense":[49],"model,":[50],"or":[51],"In-VM":[52],"same":[56],"defects:":[57],"(1)":[58],"on":[59],"top":[60],"VMM,":[63],"two":[64],"virtual":[65],"machines":[66],"used,":[68],"one":[69],"user":[72],"(Guest":[73],"OS)":[74],"other":[77],"as":[78],"(Host":[80],"OS),":[81],"(2)":[83],"users":[84,132],"cannot":[85],"directly":[86,125],"view":[87,134],"detection":[89,93,101,138,142,150,164],"results":[90,122,157],"nor":[91],"configure":[92,136],"system":[94,151],"Guest":[97,129,154],"OS.":[98,155],"A":[99],"layered":[100],"model":[102,143],"is":[103,112],"proposed":[104,163],"overcome":[106],"these":[107],"issues,":[108],"bottom":[110],"layer":[111],"responsible":[113],"for":[114,116],"security":[115],"layers":[118],"above":[119],"it.":[120],"Detection":[121],"can":[123,133,144],"displayed":[126],"OS,":[130],"system.":[139],"Furthermore,":[140],"isolate":[145],"attacks":[147],"Experiment":[156],"show":[158],"validity":[160],"model.":[165]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2064915393","counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-01-20T17:52:28.040444","created_date":"2016-06-24"}