{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:40:02Z","timestamp":1748565602673,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319228457"},{"type":"electronic","value":"9783319228464"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22846-4_18","type":"book-chapter","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T13:50:58Z","timestamp":1439473858000},"page":"300-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Cole\u015fa","sequence":"first","affiliation":[]},{"given":"S\u00e1ndor","family":"Luk\u00e1cs","sequence":"additional","affiliation":[]},{"given":"Vlad","family":"Topan","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Cioca\u015f","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Pop","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,14]]},"reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1353535.1346284","volume":"42","author":"X Chen","year":"2008","unstructured":"Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. SIGOPS Oper. Syst. Rev. 42(2), 2\u201313 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"4","key":"18_CR2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/2644865.2541986","volume":"49","author":"J Criswell","year":"2014","unstructured":"Criswell, J., Dautenhahn, N., Adve, V.: Virtual ghost: protecting applications from hostile operating systems. SIGPLAN Not. 49(4), 81\u201396 (2014)","journal-title":"SIGPLAN Not."},{"key":"18_CR3","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceedings of the Network and Distributed Systems Security Symposium, pp. 191\u2013206 (2003)"},{"issue":"6","key":"18_CR4","first-page":"28","volume":"32","author":"T Garfinkel","year":"2007","unstructured":"Garfinkel, T., Warfield, A.: What virtualization can do for security. Login: USENIX Mag. 32(6), 28\u201334 (2007)","journal-title":"Login: USENIX Mag."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Hoekstra, M., Lal, R., Pappachan, P., Phegade, V., Del Cuvillo, J.: Using innovative instructions to create trustworthy software solutions. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, ACM (2013)","DOI":"10.1145\/2487726.2488370"},{"issue":"11","key":"18_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1592761.1592773","volume":"52","author":"B Lampson","year":"2009","unstructured":"Lampson, B.: Privacy and security: usable security: how to get it. Commun. ACM 52(11), 25\u201327 (2009)","journal-title":"Commun. ACM"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Lutas, A., Luk\u00e1cs, S., Colesa, A., Lutas, D.: U-HIPE: hypervisor-based protection of user-mode processes in windows. J. Comput. Virol. Hacking Tech. pp. 1\u201314 (2015)","DOI":"10.1007\/s11416-015-0237-z"},{"key":"18_CR8","unstructured":"Lutas, D.H., Lukacs, S., Tosa, R.V., Lutas, A.V.: Towards secure network communications with clients having cryptographically attestable integrity. In: Proceedings of the Romanian Academy, 14(Special issue), 338\u2013356 (2013)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: efficient TCB reduction and attestation. In: 2010 IEEE Symposium on Security and Privacy (SP), 0, pp. 143\u2013158. IEEE, May 2010","DOI":"10.1109\/SP.2010.17"},{"issue":"4","key":"18_CR10","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1357010.1352625","volume":"42","author":"JM McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. SIGOPS Oper. Syst. Rev. 42(4), 315\u2013328 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Newsome, J., McCune, J.M., Zhou, Z., Gligor, V.D.: Building verifiable trusted path on commodity x86 computers. In: 2012 IEEE Symposium on Security and Privacy, SP 2012, 0, pp. 616\u2013630. IEEE, May 2012","DOI":"10.1109\/SP.2012.42"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Owusu, E., Guajardo, J., McCune, J., Newsome, J., Perrig, A., Vasudevan, A.: OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2508859.2516678"},{"key":"18_CR13","unstructured":"Sun, K., Wang, J., Zhang, F., Stavrou, A.: SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (2012)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Vasudevan, A., Chaki, S., Jia, L., McCune, J., Newsome, J., Datta, A.: Design, implementation and verification of an eXtensible and modular hypervisor framework. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013. pp. 430\u2013444. IEEE Computer Society (2013)","DOI":"10.1109\/SP.2013.36"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-30921-2_3","volume-title":"Trust and Trustworthy Computing","author":"A Vasudevan","year":"2012","unstructured":"Vasudevan, A., Parno, B., Qu, N., Gligor, V.D., Perrig, A.: Lockdown: towards a safe and practical architecture for security applications on commodity platforms. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 34\u201354. Springer, Heidelberg (2012)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TDSC.2013.53","volume":"4","author":"F Zhang","year":"2014","unstructured":"Zhang, F., Wang, J., Sun, K., Stavrou, A.: HyperCheck: a hardware-assisted integrity monitor. IEEE Trans. Dependable Secure Comput. 4, 332\u2013344 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Yu, M., Gligor, V.D.: Dancing with giants: wimpy kernels for on-demand isolated I\/O. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 308\u2013323. IEEE, May 2014","DOI":"10.1109\/SP.2014.27"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22846-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:08:56Z","timestamp":1748563736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22846-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319228457","9783319228464"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22846-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}