{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T08:10:02Z","timestamp":1751098202317,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_41","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T14:53:21Z","timestamp":1512572001000},"page":"516-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection"],"prefix":"10.1007","author":[{"given":"Huaizhe","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Haihe","family":"Ba","sequence":"additional","affiliation":[]},{"given":"Jiangchun","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunshi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"41_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-27659-5_1","volume-title":"Information Security","author":"I Ahmed","year":"2015","unstructured":"Ahmed, I., Richard, G.G., Zoranic, A., Roussev, V.: Integrity checking of function pointers in\u00a0kernel pools via virtual machine introspection. In: Desmedt, Y. (ed.) ISC 2013. LNCS, vol. 7807, pp. 3\u201319. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27659-5_1"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Baek, H.W., Srivastava, A., Van der Merwe, J.: Cloudvmi: virtual machine introspection as a cloud service. In: Proceedings of the 2014 IEEE International Conference on Cloud Engineering (IC2E), pp. 153\u2013158. IEEE (2014)","DOI":"10.1109\/IC2E.2014.82"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Baliga, A., Kamat, P., Iftode, L.: Lurking in the shadows: identifying systemic threats to kernel data. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), pp. 246\u2013251. IEEE (2007)","DOI":"10.1109\/SP.2007.25"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Bhattasali, T., Chaki, N.: Poster: exploring security as a service for IoT enabled remote application framework. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys Companion), p. 15. ACM (2016)","DOI":"10.1145\/2938559.2948769"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Butt, S., Lagar-Cavilla, H.A., Srivastava, A., Ganapathy, V.: Self-service cloud computing. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), pp. 253\u2013264. ACM (2012)","DOI":"10.1145\/2382196.2382226"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Daniel, J., Dimitrakos, T., El-Moussa, F., Ducatel, G., Pawar, P., Sajjad, A.: Seamless enablement of intelligent protection for enterprise cloud applications through service store. In: Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 1021\u20131026. IEEE (2014)","DOI":"10.1109\/CloudCom.2014.92"},{"issue":"2","key":"41_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2516951.2505124","volume":"16","author":"Y Fu","year":"2013","unstructured":"Fu, Y., Lin, Z.: Bridging the semantic gap in virtual machine introspection via online kernel data redirection. ACM Trans. Inf. Syst. Secur. 16(2), 1\u201329 (2013)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"41_CR8","unstructured":"Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: Proceedings of the Conference on Network and Distributed System Security Symposium (NDSS), pp. 191\u2013206. Internet Society (2003)"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Harrison, C., Cook, D., McGraw, R., Hamilton, J.: Constructing a cloud-based IDS by merging VMI with FMA. In: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 163\u2013169. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.113"},{"key":"41_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-662-43862-6_9","volume-title":"Monitoring and Securing Virtualized Networks and Services","author":"G Hurel","year":"2014","unstructured":"Hurel, G., Badonnel, R., Lahmadi, A., Festor, O.: Outsourcing mobile security in the cloud. In: Sperotto, A., Doyen, G., Latr\u00e9, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol. 8508, pp. 69\u201373. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43862-6_9"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Jain, B., Baig, M.B., Zhang, D., Porter, D.E., Sion, R.: SoK: introspections on trust and the semantic gap. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP), pp. 605\u2013620. IEEE (2014)","DOI":"10.1109\/SP.2014.45"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through VMM-based \u201cout-of-the-box\u201d semantic view reconstruction. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 128\u2013138. ACM (2007)","DOI":"10.1145\/1315245.1315262"},{"key":"41_CR13","unstructured":"King, S.T., Dunlap, G.W., Chen, P.M.: Debugging operating systems with time-traveling virtual machines. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC), pp. 1\u201315. USENIX Association (2005)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Lengyel, T.K., Maresca, S., Payne, B.D., Webster, G.D., Vogl, S., Kiayias, A.: Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. In: Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), pp. 386\u2013395. ACM (2014)","DOI":"10.1145\/2664243.2664252"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Payne, B.D.: Simplifying virtual machine introspection using LibVMI. Technical report SAND2012-7818, Sandia National Laboratories (2012)","DOI":"10.2172\/1055635"},{"key":"41_CR16","doi-asserted-by":"crossref","unstructured":"Shi, J., Yang, Y., He, J., Tang, C., Li, Q.: Design of a comprehensive virtual machine monitoring system. In: Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 510\u2013513. IEEE (2014)","DOI":"10.1109\/CCIS.2014.7175789"},{"key":"41_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-87403-4_3","volume-title":"Recent Advances in Intrusion Detection","author":"A Srivastava","year":"2008","unstructured":"Srivastava, A., Giffin, J.: Tamper-resistant, application-aware blocking of malicious network connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39\u201358. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87403-4_3"},{"key":"41_CR18","doi-asserted-by":"crossref","unstructured":"Suneja, S., Isci, C., Bala, V., De Lara, E., Mummert, T.: Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud. In: Proceedings of the 2014 ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), pp. 249\u2013261. ACM (2014)","DOI":"10.1145\/2591971.2592009"},{"issue":"1","key":"41_CR19","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TNSM.2014.041614.120394","volume":"11","author":"V Varadharajan","year":"2014","unstructured":"Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manage. 11(1), 60\u201375 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"41_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-15512-3_9","volume-title":"Recent Advances in Intrusion Detection","author":"J Wang","year":"2010","unstructured":"Wang, J., Stavrou, A., Ghosh, A.: HyperCheck: a hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158\u2013177. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15512-3_9"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:32:51Z","timestamp":1751095971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}