{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:32:58Z","timestamp":1725514378746},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_13","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"145-161","source":"Crossref","is-referenced-by-count":6,"title":["Practical Uses of Virtual Machines for Protection of Sensitive User Data"],"prefix":"10.1007","author":[{"given":"Peter C. S.","family":"Kwan","sequence":"first","affiliation":[]},{"given":"Glenn","family":"Durfee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"SOSP \u201903: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., et al.: Xen and the art of virtualization. In: SOSP \u201903: Proceedings of the nineteenth ACM symposium on Operating systems principles, Bolton Landing, NY, USA, pp. 164\u2013177. ACM Press, New York (2003), doi:10.1145\/945445.945462"},{"key":"13_CR2","unstructured":"Chess, D.M., White, S.R.: An undetectable computer virus. In: Virus Bulletin Conference (Sept. 2002)"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses: theory and experiments. Comput. Secur.\u00a06(1), 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"13_CR4","unstructured":"Cox, R., et al.: Security in Plan 9. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, pp. 3\u201316. USENIX Association (2002)"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1073001.1073009","volume-title":"SOUPS \u201905: Proceedings of the 2005 symposium on Usable privacy and security","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: Dynamic security skins. In: SOUPS \u201905: Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, Pennsylvania, pp. 77\u201388. ACM Press, New York (2005), doi:10.1145\/1073001.1073009"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0. In: RFC 2246 (Jan. 1999)","DOI":"10.17487\/rfc2246"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"SOSP \u201903: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., et al.: Terra: a virtual machine-based platform for trusted computing. In: SOSP \u201903: Proceedings of the nineteenth ACM symposium on Operating systems principles, Bolton Landing, NY, USA, pp. 193\u2013206. ACM Press, New York (2003), doi:10.1145\/945445.945464"},{"key":"13_CR8","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Internet Society\u2019s 2003 Symposium on Network and Distributed System Security (NDSS), pp. 191\u2013206 (2003)"},{"key":"13_CR9","unstructured":"Goldberg, R.P.: Architectural principles for virtual computer systems. PhD thesis, Harvard University (1972)"},{"key":"13_CR10","unstructured":"Gutmann, P.: An open-source cryptographic coprocessor. In: Proc. 9th USENIX Security Symposium, Denver, CO (Aug. 2000)"},{"key":"13_CR11","unstructured":"Intel: Intel Virtualization Technology Specification for the IA-32 Intel Architecture (2005)"},{"key":"13_CR12","unstructured":"Intel: Lagrande technology (2005), http:\/\/www.intel.com\/technology\/security"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: 17th Annual Computer Security Applications Conference (2001)","DOI":"10.1109\/ACSAC.2001.991542"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lee, R.B., et al.: Architecture for protecting critical secrets in microprocessors. In: ISCA \u201905: Proceedings of the 32nd Annual International Symposium on Computer Architecture, June 2005, pp. 2\u201313 (2005)","DOI":"10.1109\/ISCA.2005.14"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Lie, D., et al.: Architectural support for copy and tamper resistant software. In: ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp. 168\u2013177 (2000)","DOI":"10.21236\/ADA419599"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Marchesini, J., et al.: Open-source applications of TCPA hardware. In: 20th Annual Computer Security Applications Conference (2004)","DOI":"10.1109\/CSAC.2004.25"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"McCarty, B.: Automated identity theft. IEEE Security & Privacy Magazine\u00a01(5) (2003)","DOI":"10.1109\/MSECP.2003.1236244"},{"key":"13_CR18","unstructured":"Meushaw, R., et al.: Device for and method of secure computing using virtual machines. U.S. Patent no. 6,922,774 (July 2005)"},{"key":"13_CR19","unstructured":"Meushaw, R., Simard, D.: NetTop: Commercial Technology in High Assurance Applications. NSA Tech. Trend Notes, 9(4) (2000), http:\/\/www.vmware.com\/pdf\/TechTrendNotes.pdf"},{"key":"13_CR20","unstructured":"Raghunath, M.T., et al.: Reincarnating PCs with Portable SoulPads. Technical Report RC 23418, IBM Research (June 2005)"},{"key":"13_CR21","unstructured":"Ross, B., et al.: Stronger password authentication using browser extensions. In: Proc. 14th USENIX Security Symposium (2005)"},{"key":"13_CR22","unstructured":"Sapuntzakis, C., et al.: Virtual appliances for deploying and maintaining software. In: Proceedings of the Seventeenth Large Installation Systems Administration Conference (LISA 2003), San Diego, CA (October 2003)"},{"issue":"9","key":"13_CR23","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks\u00a031(9), 831\u2013860 (1999)","journal-title":"Computer Networks"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Suh, G.E., et al.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA \u201905: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pp. 25\u201336 (2005)","DOI":"10.1109\/ISCA.2005.22"},{"key":"13_CR25","unstructured":"Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: Making trust between applications and operating systems configurable. In: Proc. 7th Symposium on Operating Systems Design and Implementation (Nov. 2006)"},{"key":"13_CR26","unstructured":"Trusted Computing Group. TCG TPM Specification Version 1.2 Revision 85 (Feb. 2005), http:\/\/www.trustedcomputinggroup.org"},{"key":"13_CR27","volume-title":"Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment","author":"J.D. Tygar","year":"1993","unstructured":"Tygar, J.D., Yee, B.: Dyad: a system for using phyiscally secure coprocessors. In: Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment, Apr. 1993, MIT Press, Cambridge (1993)"},{"key":"13_CR28","unstructured":"VMware. VMware ACE, http:\/\/www.vmware.com\/products\/desktop\/ace_features.html"},{"key":"13_CR29","unstructured":"X.org Foundation. Documentation (2005), http:\/\/www.x.org\/"},{"key":"13_CR30","unstructured":"Ylonen, T., Lonvick, C.: SSH authentication protocol. IETF Internet Draft (Mar. 2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:29:17Z","timestamp":1605763757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_13","relation":{},"subject":[]}}