{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:12Z","timestamp":1740099132436,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004699"},{"type":"electronic","value":"9783030004705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00470-5_30","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:43:19Z","timestamp":1536216199000},"page":"647-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Furnace: Self-service Tenant VMI for the Cloud"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2301-9727","authenticated-orcid":false,"given":"Micah","family":"Bushouse","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1775-0639","authenticated-orcid":false,"given":"Douglas","family":"Reeves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","unstructured":"Arulraj, L., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Improving virtualized storage performance with sky. In: ACM VEE (2017). \nhttps:\/\/doi.org\/10.1145\/3050748.3050755","DOI":"10.1145\/3050748.3050755"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Baek, H.W., Srivastava, A., Merwe, J.V.D.: CloudVMI: virtual machine introspection as a cloud service. In: 2014 IEEE International Conference on Cloud Engineering, pp. 153\u2013158 (2014). \nhttps:\/\/doi.org\/10.1109\/IC2E.2014.82","DOI":"10.1109\/IC2E.2014.82"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Bahram, S., et al.: DKSM: subverting virtual machine introspection for fun and profit. In: 29th IEEE Symposium on Reliable Distributed Systems, October 2010","DOI":"10.1109\/SRDS.2010.39"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2775111","volume":"48","author":"E Bauman","year":"2015","unstructured":"Bauman, E., Ayoade, G., Lin, Z.: A survey on hypervisor-based monitoring: approaches, applications, and evolutions. ACM Comput. Surv. 48, 10 (2015)","journal-title":"ACM Comput. Surv."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Bushouse, M., Ahn, S., Reeves, D.: Arav: monitoring a cloud\u2019s virtual routers. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research (2017)","DOI":"10.1145\/3064814.3064829"},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Butt, S., Lagar-Cavilla, H.A., Srivastava, A., Ganapathy, V.: Self-service cloud computing. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. CCS 2012, pp. 253\u2013264. ACM, New York (2012). \nhttps:\/\/doi.org\/10.1145\/2382196.2382226","DOI":"10.1145\/2382196.2382226"},{"key":"30_CR7","unstructured":"Dolan-Gavitt, B., Payne, B., Lee, W.: Leveraging forensic tools for virtual machine introspection. Technical report, Georgia Institute of Technology (2011)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"S87","DOI":"10.1016\/j.diin.2013.06.010","volume":"10","author":"J Dykstra","year":"2013","unstructured":"Dykstra, J., Sherman, A.T.: Design and implementation of FROST: digital forensic tools for the openstack cloud computing platform. Digit. Invest. 10, S87\u2013S95 (2013)","journal-title":"Digit. Invest."},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1007\/978-3-319-26148-5_40","volume-title":"On the Move to Meaningful Internet Systems: OTM 2015 Conferences","author":"A Fischer","year":"2015","unstructured":"Fischer, A.: CloudIDEA: a malware defense architecture for cloud data centers. In: Debruyne, C. (ed.) On the Move to Meaningful Internet Systems: OTM 2015 Conferences. OTM 2015, vol. 9415, pp. 594\u2013611. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-26148-5_40"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Fraser, T., Evenson, M., Arbaugh, W.: VICI virtual machine introspection for cognitive immunity. In: 2008 Annual Computer Security Applications Conference. ACSAC 2008 (2008)","DOI":"10.1109\/ACSAC.2008.33"},{"key":"30_CR11","unstructured":"Garfinkel, T.: Traps and pitfalls: practical problems in system call interposition based security tools. In: NDSS, vol. 3, pp. 163\u2013176 (2003)"},{"key":"30_CR12","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceedings of the Network and Distributed Systems Security Symposium (2003)"},{"key":"30_CR13","unstructured":"Gorenc, B., Spelman, J.: Thinking Outside the Sandbox: Violating Trust Boundaries in Uncommon Ways. Black Hat, USA (2014)"},{"key":"30_CR14","unstructured":"Jaeger, T., Sailer, R., Zhang, X.: Analyzing integrity protection in the SELinux example policy. In: USENIX SEC (2003)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Jain, B., Baig, M.B., Zhang, D., Porter, D.E., Sion, R.: SoK: introspections on trust and the semantic gap. In: IEEE S&P (2014)","DOI":"10.1109\/SP.2014.45"},{"key":"30_CR16","unstructured":"Kim, T., Zeldovich, N.: Practical and effective sandboxing for non-root users. In: USENIX ATC, San Jose, CA (2013)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Lengyel, T.K., Maresca, S., Payne, B.D., Webster, G.D., Vogl, S., Kiayias, A.: Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. In: Proceedings of the 30th Annual Computer Security Applications Conference. ACSAC 2014. ACM (2014)","DOI":"10.1145\/2664243.2664252"},{"key":"30_CR18","unstructured":"Liu, Z., Lovet, G.: Breeding sandworms: how to fuzz your way out of adobe reader x\u2019s sandbox. In: Black Hat EUROPE (2012)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Payne, B.D., de Carbone, M., Lee, W.: Secure and flexible monitoring of virtual machines. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (2007)","DOI":"10.1109\/ACSAC.2007.10"},{"key":"30_CR20","unstructured":"Provos, N.: Improving host security with system call policies. In: USENIX SEC (2003)"},{"key":"30_CR21","doi-asserted-by":"publisher","unstructured":"Sanders, M., Yue, C.: Automated least privileges in cloud-based web services. In: Proceedings of the Fifth ACM\/IEEE Workshop on Hot Topics in Web Systems and Technologies. HotWeb 2017, pp. 3:1\u20133:6. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3132465.3132470","DOI":"10.1145\/3132465.3132470"},{"issue":"3","key":"30_CR22","doi-asserted-by":"publisher","first-page":"46:1","DOI":"10.1145\/2856126","volume":"48","author":"D Sgandurra","year":"2016","unstructured":"Sgandurra, D., Lupu, E.: Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput. Surv. 48(3), 46:1\u201346:38 (2016). \nhttps:\/\/doi.org\/10.1145\/2856126","journal-title":"ACM Comput. Surv."},{"key":"30_CR23","unstructured":"Shin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: NDSS (2013)"},{"key":"30_CR24","doi-asserted-by":"publisher","unstructured":"Suneja, S., Isci, C., de Lara, E., Bala, V.: Exploring VM introspection: techniques and trade-offs. In: ACM VEE (2015). \nhttps:\/\/doi.org\/10.1145\/2731186.2731196","DOI":"10.1145\/2731186.2731196"},{"key":"30_CR25","unstructured":"Swiecki, R.: Promises and pitfalls of sandboxes. In: Presented at CONFidence (2017)"},{"key":"30_CR26","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A Takanen","year":"2008","unstructured":"Takanen, A., Demott, J.D., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance. Artech House, Norwood (2008)"},{"key":"30_CR27","doi-asserted-by":"publisher","unstructured":"Taubmann, B., Rakotondravony, N., Reiser, H.P.: CloudPhylactor: harnessing mandatory access control for virtual machine introspection in cloud data centers. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 957\u2013964, August 2016. \nhttps:\/\/doi.org\/10.1109\/TrustCom.2016.0162","DOI":"10.1109\/TrustCom.2016.0162"},{"key":"30_CR28","volume-title":"Windows Internals","author":"P Yosifovich","year":"2017","unstructured":"Yosifovich, P., Russinovich, M.E., Solomon, D.A., Ionescu, A.: Windows Internals, 7th edn. Microsoft Press, Redmond (2017)","edition":"7"},{"key":"30_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-319-19129-4_17","volume-title":"Distributed Applications and Interoperable Systems","author":"J Zach","year":"2015","unstructured":"Zach, J., Reiser, H.P.: LiveCloudInspector: towards integrated IaaS forensics in the cloud. In: Bessani, A., Bouchenak, S. (eds.) DAIS 2015. LNCS, vol. 9038, pp. 207\u2013220. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-19129-4_17"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00470-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T07:12:02Z","timestamp":1536217922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00470-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004699","9783030004705"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00470-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}