{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:03:16Z","timestamp":1749787396361,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491448"},{"type":"electronic","value":"9783319491455"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49145-5_14","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T08:52:57Z","timestamp":1478681577000},"page":"134-143","source":"Crossref","is-referenced-by-count":2,"title":["A Software Detection Mechanism Based on SMM in Network Computing"],"prefix":"10.1007","author":[{"given":"Lei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yang","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s10207-014-0261-x","volume":"14","author":"MI Al-Saleh","year":"2014","unstructured":"Al-Saleh, M.I., Abuhjeela, F.M., Al-Sharif, Z.A.: Investigating the detection capabilities of antiviruses under concurrent attacks. Int. J. Inf. Secur. 14(4), 387\u2013396 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.cose.2015.12.002","volume":"58","author":"F Abazari","year":"2016","unstructured":"Abazari, F., Analoui, M., Takabi, H.: Effect of anti-malware software on infectious nodes in cloud environment. IEEE Comput. Secur. 58, 139\u2013148 (2016)","journal-title":"IEEE Comput. Secur."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow. In: Proceedings of the Sixth ACM Symposium on Access Control Models & Technologies, pp. 66\u201374 (2015)","DOI":"10.1145\/373256.373266"},{"issue":"4","key":"14_CR4","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1109\/TC.2015.2479609","volume":"61","author":"S Tang","year":"2016","unstructured":"Tang, S., Li, X., Huang, X., et al.: Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans. Comput. 61(4), 2325\u20132331 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Saravanakumar, C., Arun, C.: Survey on interoperability, security, trust, privacy standardization of cloud computing. In: International Conference on Contemporary Computing and Informatics (IC3I) (2014)","DOI":"10.1109\/IC3I.2014.7019735"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Jain, P., Rane, D., Patidar, S.: A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. In: World Congress on IEEE Information and Communication Technologies (WICT), pp. 456\u2013461 (2011)","DOI":"10.1109\/WICT.2011.6141288"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z.: Inktag: secure applications on an untrusted operating system. In: ACM SIGARCH Computer Architecture News, vol. 41(1), pp. 265\u2013278 (2013)","DOI":"10.1145\/2451116.2451146"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-11203-9_13","volume-title":"Computer Security - ESORICS 2014","author":"F Zhang","year":"2014","unstructured":"Zhang, F., Wang, H., Leach, K., Stavrou, A.: A framework to secure peripherals at runtime. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 219\u2013238. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-11203-9_13"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, D., Park, J., Kim, J., Kim, H.: An efficient Kernel introspection system using a secure timer on TrustZone, 25(4), 863\u2013872 (2015)","DOI":"10.13089\/JKIISC.2015.25.4.863"},{"issue":"1","key":"14_CR10","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2775111","volume":"48","author":"E Bauman","year":"2015","unstructured":"Bauman, E., Ayoade, G., Lin, Z.: A survey on hypervisor-based monitoring: approaches, applications, and evolutions. ACM Comput. Surv. (CSUR) 48(1), 10 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"6","key":"14_CR11","first-page":"498","volume":"411","author":"X Xie","year":"2013","unstructured":"Xie, X., Wang, W.: Rootkit detection on virtual machines through deep information extraction at hypervisor-level. Commun. Netw. Secur. 411(6), 498\u2013503 (2013)","journal-title":"Commun. Netw. Secur."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, N., Sun, K., Lou, W., Hou, Y.T., Jajodia, S.: Now you see me: hide and seek in physical address space. In: ACM Symposium on Information, Computer and Communications Security, pp. 321\u2013331 (2015)","DOI":"10.1145\/2714576.2714600"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-25141-2_7","volume-title":"Advances in Information and Computer Security","author":"J Pfoh","year":"2011","unstructured":"Pfoh, J., Schneider, C., Eckert, C.: Nitro: hardware-based system call tracing for virtual machines. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol. 7038, pp. 96\u2013112. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25141-2_7"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, L., Liu, X., Liu, Q., Wang, G.: A cleanroom monitoring system for network computing service based on remote attestation. In: 2016 IEEE Trustcom (2016, accepted)","DOI":"10.1109\/TrustCom.2016.0096"},{"issue":"12","key":"14_CR15","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1002\/sec.166","volume":"6","author":"S Embleton","year":"2013","unstructured":"Embleton, S., Sparks, S., Zou, C.: SMM rootkit: a new breed of OS independent malware. Secur. Commun. Netw. 6(12), 1590\u20131605 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"14_CR16","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/TDSC.2011.61","volume":"9","author":"W Xu","year":"2012","unstructured":"Xu, W., Zhang, X., Hu, H., Ahn, G., Seifert, J.: Remote attestation with domain-based integrity model and policy analysis. IEEE Trans. Dependable Secure Comput. 9(3), 429\u2013442 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Reina, A., et al.: When hardware meets software: a bulletproof solution to forensic memory acquisition, pp. 79\u201388 (2012)","DOI":"10.1145\/2420950.2420962"},{"key":"14_CR18","unstructured":"Korkin, I., Nesterov, I.: Applying memory forensics to rootkit detection. In: ADFSL Conference on Digital Forensics, Security and Law (2014)"},{"issue":"1","key":"14_CR19","first-page":"7","volume":"11","author":"Y Huang","year":"2014","unstructured":"Huang, Y., et al.: HMTT: a hybrid hardware\/software tracing system for bridging the DRAM access trace\u2019s semantic gap. ACM Trans. Architect. Code Optim. (TACO) 11(1), 7 (2014)","journal-title":"ACM Trans. Architect. Code Optim. (TACO)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy and Anonymity in Computation, Communication and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49145-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T05:50:16Z","timestamp":1749707416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49145-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491448","9783319491455"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49145-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}