{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:04:54Z","timestamp":1747890294600,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319175324"},{"type":"electronic","value":"9783319175331"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17533-1_2","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T12:50:20Z","timestamp":1428497420000},"page":"18-32","source":"Crossref","is-referenced-by-count":0,"title":["Expanding an Operating System\u2019s Working Space with a New Mode to Support Trust Measurement"],"prefix":"10.1007","author":[{"given":"Chenglong","family":"Wei","sequence":"first","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1314354.1314362","volume-title":"2007 ACM workshop on Scalable Trusted Computing","author":"P.A. Loscocco","year":"2007","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., et al.: Linux Kernel Integrity Measurement Using Contextual Inspection. In: 2007 ACM workshop on Scalable Trusted Computing, pp. 21\u201329. ACM Press, New York (2007)"},{"key":"2_CR2","unstructured":"Sailer, R., Zhang, X., Jaeger, T., et al.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th USENIX Security Symposium, pp. 223\u2013238 (2004)"},{"key":"2_CR3","first-page":"19","volume-title":"11th ACM Symposium on Access Control Models and Technologies","author":"T. Jaeger","year":"2006","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: PRIMA: Policy-Reduced Integrity Measurement Architecture. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 19\u201328. ACM Press, New York (2006)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14597-1_1","volume-title":"Trusted Systems","author":"W. Shi","year":"2010","unstructured":"Shi, W.: On Design of a Trusted Software Base with Support of TPCM. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"2_CR5","unstructured":"Loscocco, P.A., Smalley, S.D., Muckelbauer, P.A., et al.: The Flawed Assumption of Security in Modern Computing Environments. In: 21st National Information Systems Security Conference, pp. 303\u2013314 (1998)"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1047915.1047919","volume":"23","author":"M.M. Swift","year":"2005","unstructured":"Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity Operating Systems. ACM Transactions on Computer Systems\u00a023(1), 77\u2013110 (2005)","journal-title":"ACM Transactions on Computer Systems"},{"key":"2_CR7","unstructured":"Venema, W.: Isolation Mechanisms for Commodity Applications and Platforms. IBM Technical Report, RC24725(W0901-048) (2009)"},{"issue":"10","key":"2_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.955100","volume":"34","author":"J.G. Dyer","year":"2001","unstructured":"Dyer, J.G., Lindemann, M., Perez, R., et al.: Building the IBM 4758 Secure Coprocessor. IEEE Computer\u00a034(10), 57\u201366 (2001)","journal-title":"IEEE Computer"},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1145\/782814.782838","volume-title":"17th Annual International Conference on Supercomputing (ICS 2003)","author":"G.E. Suh","year":"2003","unstructured":"Suh, G.E., Clarke, D., Gassend, B., et al.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: 17th Annual International Conference on Supercomputing (ICS 2003), pp. 160\u2013171. ACM Press, New York (2003)"},{"key":"2_CR10","first-page":"477","volume-title":"16th ACM Conference on Computer and Communications Security (CCS 2009)","author":"M. Sharif","year":"2009","unstructured":"Sharif, M., Lee, W., Cui, W., et al.: Secure In-VM Monitoring Using Hardware Virtualization. In: 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 477\u2013487. ACM Press, New York (2009)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Sezer, E.C., et al.: HIMA: A Hypervisor Based Integrity Measurement Agent. In: 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 461\u2013470. IEEE Press (2009)","DOI":"10.1109\/ACSAC.2009.50"},{"issue":"5","key":"2_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2005.176","volume":"38","author":"M. Rosenblum","year":"2005","unstructured":"Rosenblum, M., Garfinkel, T.: Virtual Machine Monitors: Current Technology and Future Trends. IEEE Computer\u00a038(5), 39\u201347 (2005)","journal-title":"IEEE Computer"},{"key":"2_CR13","unstructured":"Garfinkel, T., Rosenblum, M.: When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. In: 10th USENIX Workshop on Hot Topics in Operating Systems. USENIX Press, Berkeley (2005)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Drepper, U.: The Cost of Virtualization. ACM QUEUE, 30\u201335 (January\/February 2008)","DOI":"10.1145\/1348583.1348591"},{"key":"2_CR15","unstructured":"TPM Main - Part 1 Design Principles - Specification Version 1.2. Trusted Computing Group (July 2007)"},{"key":"2_CR16","unstructured":"Advanced Micro Devices: AMD64 Virtualization: Secure Virtual Machine Architecture Reference Manual. AMD Publication, no.33047, rev. 3.01. (2005)"},{"issue":"03","key":"2_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1535\/itj.1003.01","volume":"10","author":"G. Neiger","year":"2006","unstructured":"Neiger, G., Santoni, A., Leung, F.: Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal\u00a010(03), 167\u2013177 (2006)","journal-title":"Intel Technology Journal"},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2006.11","volume":"4","author":"J.F. Levine","year":"2006","unstructured":"Levine, J.F., Grizzard, J.B., Owen, H.L.: Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Security & Privacy\u00a04(1), 24\u201332 (2006)","journal-title":"IEEE Security & Privacy"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Wei, C., Song, S., Hua, W.: Operating Systems Support for Process Dynamic Integrity Measurement. In: IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT 2009), pp. 339\u2013342. IEEE Press (2009)","DOI":"10.1109\/YCICT.2009.5382352"},{"key":"2_CR20","unstructured":"Tygar, J.D., Yee, B.: Dyad: A System for Using Physically Secure Coprocessors. Technical Report, CMU-CS-91-140R, Carnegie Mellon University (1991)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Clark, P.C., Hoffman, L.J.: BITS: A Smartcard Protected Operating System. Communications of the ACM\u00a037(11), 66\u201370, 94 (1994)","DOI":"10.1145\/188280.188371"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A Secure and Reliable Bootstrap Architecture. In: 1997 IEEE Symposium on Security and Privacy (S&P 1997), pp. 65\u201371 (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"2_CR23","unstructured":"Maruyama, H., Seliger, F., Nagaratnam, N., et al.: Trusted Platform on Demand. Technical Report, RT0564, IBM (2004)"},{"key":"2_CR24","first-page":"19","volume-title":"11th ACM Symposium on Access Control Models and Technologies","author":"T. Jaeger","year":"2006","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: PRIMA: Policy-Reduced Integrity Measurement Architecture. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 19\u201328. ACM Press, New York (2006)"},{"key":"2_CR25","unstructured":"Intel Trusted Execution Technology - Software Development Guide - Measured Launched Environment Developer\u2019s Guide. Document Number: 315168-005, Intel (2008)"},{"issue":"4","key":"2_CR26","first-page":"18","volume":"3","author":"T. Alves","year":"2004","unstructured":"Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems. Information Quarterly\u00a03(4), 18\u201324 (2004)","journal-title":"Information Quarterly"},{"key":"2_CR27","first-page":"335","volume-title":"21st ACM Symposium on Operating Systems Principles (SOSP 2007)","author":"A. Seshadri","year":"2007","unstructured":"Seshadri, A., Luk, M., Qu, N., et al.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In: 21st ACM Symposium on Operating Systems Principles (SOSP 2007), pp. 335\u2013350. ACM Press, New York (2007)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Parno, B., Perrig, A.: Flicker: An Execution Infrastructure for TCB Minimization. In: ACM European Conference on Computer Systems, EuroSys 2008 (2008)","DOI":"10.1145\/1352592.1352625"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Li, Y., Qu, N., et al.: TrustVisor: Efficient TCB Reduction and Attestation. In: 2010 IEEE Symposium on Security and Privacy (SP 2010), pp. 143\u2013158 (2010)","DOI":"10.1109\/SP.2010.17"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17533-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:20:24Z","timestamp":1747873224000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17533-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319175324","9783319175331"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17533-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}