{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:09Z","timestamp":1725494469900},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767879"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76788-6_13","type":"book-chapter","created":{"date-parts":[[2007,11,12]],"date-time":"2007-11-12T14:24:16Z","timestamp":1194877456000},"page":"156-167","source":"Crossref","is-referenced-by-count":8,"title":["A Secure Virtual Execution Environment for Untrusted Code"],"prefix":"10.1007","author":[{"given":"Yan","family":"Wen","sequence":"first","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/0167-4048(89)90094-1","volume":"8","author":"F. Cohen","year":"1989","unstructured":"Cohen, F.: Computational Aspects of Computer Viruses. Computers & Security\u00a08, 325\u2013344 (1989)","journal-title":"Computers & Security"},{"key":"13_CR2","unstructured":"Chess, D.M., White, S.R.: An Undetectable Computer Virus (2000)"},{"key":"13_CR3","unstructured":"Goldberg, R.P.: Architectural Principles for Virtual Computer Systems, Ph.D. Thesis. Harvard University, Cambridge, MA (1972)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1535\/itj.1003.01","volume":"10","author":"G. Neiger","year":"2006","unstructured":"Neiger, G., Santoni, A., Leung, F., Rodgers, D., Uhlig, R.: Intel\u00ae Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal\u00a010, 167\u2013177 (2006)","journal-title":"Intel Technology Journal"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. In: ASPLOS 2006. Proceedings of The 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2\u201313 (2006)","DOI":"10.1145\/1168857.1168860"},{"key":"13_CR6","unstructured":"Sugerman, J., Venkitachalam, G., Lim, B.-H.: Virtualizing I\/O Devices on VMware Workstation\u2019s Hosted Virtual Machine Monitor. In: Proceedings of the 2001 USENIX Annual Technical Conference, Boston, Massachusetts, USA (2001)"},{"key":"13_CR7","unstructured":"ScottRobin, J.: Analyzing the Intel Pentium\u2019s Capability to Support a Secure Virtual Machine Monitor, Master\u2019s Thesis. Naval Postgraduate School, Monterey, CA, p. 133 (1999)"},{"key":"13_CR8","unstructured":"Bellard, F.: QEMU, a Fast and Portable Dynamic Translator. In: USENIX Association Technical Conference (2005)"},{"key":"13_CR9","unstructured":"The IoMeter Project, http:\/\/iometer.sourceforge.net"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Chiueh, T.-c., Sankaran, H., Neogi, A.: Spout: A Transparent Distributed Execution Engine for Java Applets. In: Proceedings of the 20th International Conference on Distributed Computing Systems, p. 394 (2000)","DOI":"10.1109\/ICDCS.2000.840951"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1109\/32.888632","volume":"26","author":"D. Malkhi","year":"2000","unstructured":"Malkhi, D., Reiter, M.K.: Secure Execution of Java Applets using A Remote Playground. IEEE Transactions on Software Engineering\u00a026, 1197\u20131209 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36606-7","volume-title":"Advances in Computer Systems Architecture","author":"Z. Liang","year":"2003","unstructured":"Liang, Z., Venkatakrishnan, V.N., Sekar, R.: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. In: Omondi, A.R., Sedukhin, S. (eds.) ACSAC 2003. LNCS, vol.\u00a02823, Springer, Heidelberg (2003)"},{"key":"13_CR13","unstructured":"Sun, W., Liang, Z., Sekar, R., Venkatakrishnany, V.N.: One-way Isolation: An Effective Approach for Realizing Safe Execution Environments. In: NDSS 2005. ISOC Network and Distributed System Security (2005)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Chen, P.M., Noble, B.D.: When Virtual is Better Than Real. In: 8th Workshop on Hot Topics in Operating Systems (2001)","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"13_CR15","unstructured":"Dike, J.: A User-mode Port of the Linux Kernel. In: Proceedings of the 4th Annual Linux Showcase & Conference, Atlanta, Georgia, USA (2000)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Whitaker, A., Shaw, M., Gribble, S.D.: Denali: A Scalable Isolation Kernel. In: Proceedings of the Tenth ACM SIGOPS European Workshop, Saint-Emilion, France (2002)","DOI":"10.1145\/1133373.1133375"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"SOSP 2003. Proceedings of the 19th ACM Symposium on Operating Systems Principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: SOSP 2003. Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 164\u2013177. ACM Press, New York (2003)"},{"key":"13_CR18","unstructured":"Biemueller, S., Dannowski, U.: L4-Based Real Virtual Machines - An API Proposal. In: Proceedings of the MIKES 2007: First International Workshop on MicroKernels for Embedded Systems, Sydney, Australia, pp. 36\u201342 (2007)"},{"key":"13_CR19","unstructured":"SWsoft: http:\/\/www.parallels.com\/en\/products\/workstation"},{"key":"13_CR20","unstructured":"Qumranet: KVM: Kernel-based Virtualization Driver (2006)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C.M., Anderson, A.V., Bennett, S.M., K\u00e4gi, A., Leung, F.H., Smith, L.: Intel Virtualization Technology. IEEE Computer\u00a038 (2005)","DOI":"10.1109\/MC.2005.163"},{"key":"13_CR22","unstructured":"AMD: AMD64 Vrtualization Codenamed \"pacifica\" Technology: Secure Virtual Machine Architecture Reference Manual (May 2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76788-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:38:24Z","timestamp":1619519904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76788-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767879"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76788-6_13","relation":{},"subject":[]}}