{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:31:18Z","timestamp":1763641878652,"version":"3.40.5"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_3","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"28-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Performance Analysis of ARM Virtual Machines Secured Using SELinux"],"prefix":"10.1007","author":[{"given":"Michele","family":"Paolino","sequence":"first","affiliation":[]},{"given":"Mian M.","family":"Hamayun","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Raho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"3_CR1","first-page":"6","volume":"574","author":"J Barr","year":"2002","unstructured":"Barr, J.: The Flask Security Architecture. Comput. Sci. 574, 6 (2002)","journal-title":"Comput. Sci."},{"key":"3_CR2","unstructured":"Coker, G.: Xen security modules (XSM). Xen Summit, pp. 1\u201333 (2006)"},{"key":"3_CR3","unstructured":"Coker, R.: Porting NSA security enhanced linux to hand-held devices. In: Proceedings of the Linux Symposium, Ottawa Linux Symposium (2003)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Fiorin, L., Ferrante, A., Padarnitsas, K., Regazzoni, F.: Security enhanced linux on embedded systems: a hardware-accelerated implementation. In: 17th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 29\u201334. IEEE (2012)","DOI":"10.1109\/ASPDAC.2012.6164960"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Lepreau, J., Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D.: The flask security architecture: system support for diverse security policies. In: SSYM\u201999 Proceedings of the 8th conference on USENIX Security Symposium (2006)","DOI":"10.21236\/ADA443108"},{"key":"3_CR6","unstructured":"Lindqvist, H.: Mandatory access control. Master\u2019s Thesis in Computing Science, Umea University, Department of Computing Science, SE-901 87 (2006)"},{"key":"3_CR7","volume-title":"SELinux by Example: Using Security Enhanced Linux","author":"F Mayer","year":"2006","unstructured":"Mayer, F., Caplan, D., MacMillan, K.: SELinux by Example: Using Security Enhanced Linux. Pearson Education, Prentice Hall (2006)"},{"key":"3_CR8","unstructured":"Nahari, H.: Trusted secure embedded linux. In: Proceedings of 2007 Linux Symposium, pp. 79\u201385. Citeseer, Ottawa Ontario, Canada:[sn] (2007)"},{"key":"3_CR9","unstructured":"Nakamura, Y., Sameshima, Y.: SELinux for consumer electronics devices. In: Proceedings of Linux Symposium, pp. 125\u2013133 (2008)"},{"key":"3_CR10","unstructured":"Paolino, M.: sVirt Security for KVM Virtualization on OMAP5 uEVM. http:\/\/www.virtualopensystems.com\/en\/solutions\/guides\/kvm-svirt-omap5\/"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Park, J., Kim, B., Kim, S.R., Yoon, J.H., Cho, Y.: Performance analysis of security enforcement on android operating system. In: Proceedings of the 2011 ACM Symposium on Research in Applied Computation, pp. 282\u2013286. ACM (2011)","DOI":"10.1145\/2103380.2103438"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2480741.2480757","volume":"45","author":"G P\u00e9k","year":"2013","unstructured":"P\u00e9k, G., Bencs\u00e1th, B., et al.: A survey of security issues in hardware virtualization. ACM Comput. Surv. (CSUR) 45(3), 40 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"P\u00e9k, G., Lanzi, A., Srivastava, A., Balzarotti, D., Francillon, A., Neumann, C.: On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS) (2014)","DOI":"10.1145\/2590296.2590299"},{"key":"3_CR14","unstructured":"Reuben, J.S.: A survey on virtual machine security. Helsinki University of Technology (2007)"},{"key":"3_CR15","unstructured":"Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doorn, L.: Building a MAC-based security architecture for the xen open-source hypervisor. In: 21st Annual Computer Security Applications Conference, 10 pp. IEEE (2005)"},{"key":"3_CR16","unstructured":"Sailer, R., Valdez, E., Jaeger, T., Perez, R., Van Doorn, L., Griffin, J.L., Berger, S., Sailer, R., Valdez, E., Jaeger, T., et al.: sHype: secure hypervisor approach to trusted virtualized systems. Technical report, RC23511 (2005)"},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2019599.2019604","volume":"14","author":"ZC Schreuders","year":"2011","unstructured":"Schreuders, Z.C., McGill, T., Payne, C.: Empowering end users to confine their own applications: the results of a usability study comparing SELinux, AppArmor, and FBAC-LSM. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(2), 19 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"3","key":"3_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSP.2009.144","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Elovici, Y.: Securing android-powered mobile devices using SELinux. IEEE Secur. Priv. 8(3), 36\u201344 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR19","first-page":"43","volume":"1","author":"S Smalley","year":"2001","unstructured":"Smalley, S., Vance, C., Salamon, W.: Implementing SELinux as a linux security module. NAI Labs Rep. 1, 43 (2001)","journal-title":"NAI Labs Rep."},{"issue":"1","key":"3_CR20","first-page":"14","volume":"2","author":"M Thapliyal","year":"2014","unstructured":"Thapliyal, M., Mandoria, H.L., Garg, N.: Data security analysis in cloud environment: a review. Int. J. Innovations Adv. Comput. Sci. 2(1), 14\u201319 (2014)","journal-title":"Int. J. Innovations Adv. Comput. Sci."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Vogel, B., Steinke, B.: Using SELinux security enforcement in linux-based embedded devices. In: Proceedings of the 1st international Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 15 (2008)","DOI":"10.4108\/ICST.MOBILWARE2008.2927"},{"key":"3_CR22","unstructured":"Vollmar, W., Harris, T., Long Jr., L., Green, R.: Hypervisor security in cloud computing systems. ACM Comput. Surv., 1\u201322 (2014)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-32946-3_23","volume-title":"Financial Cryptography and Data Security","author":"M Wei\u00df","year":"2012","unstructured":"Wei\u00df, M., Heinz, B., Stumpf, F.: A cache timing attack on AES in virtualization environments. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 314\u2013328. Springer, Heidelberg (2012)"},{"key":"3_CR24","unstructured":"Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux security module framework. In: Ottawa Linux Symposium. vol. 8032 (2002)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Wright, C., Morris, J., Kroah-Hartman, G., Cowan, C., Smalley, S.: Linux security modules: general security support for the linux kernel. In: Foundations of Intrusion Tolerant Systems (OASIS\u201903), p. 213. IEEE Computer Society (2003)","DOI":"10.1109\/FITS.2003.1264934"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:12:46Z","timestamp":1747167166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}