{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:32:00Z","timestamp":1742974320278,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770473"},{"type":"electronic","value":"9783540770480"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77048-0_31","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T15:10:22Z","timestamp":1195225822000},"page":"398-411","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach for Untrusted Code Execution"],"prefix":"10.1007","author":[{"given":"Yan","family":"Wen","sequence":"first","affiliation":[]},{"given":"Jinjing","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Goldberg, R.P.: Architectural Principles for Virtual Computer Systems, Ph.D. Thesis. Harvard University, Cambridge, MA (1972)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. In: Proceedings of The 12th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2006), pp. 2\u201313 (2006)","DOI":"10.1145\/1168857.1168860"},{"key":"31_CR3","unstructured":"Sun, W., Liang, Z., Sekar, R., Venkatakrishnany, V.N.: One-way Isolation: An Effective Approach for Realizing Safe Execution Environments. ISOC Network and Distributed System Security (NDSS 2005) (2005)"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3233\/JCS-2000-8402","volume":"8","author":"P. Liu","year":"2000","unstructured":"Liu, P., Jajodia, S., McCollum, C.D.: Intrusion confinement by isolation in information systems. Journal of Computer Security\u00a08, 243\u2013279 (2000)","journal-title":"Journal of Computer Security"},{"key":"31_CR5","unstructured":"ScottRobin, J.: Analyzing the Intel Pentium\u2019s Capability to Support a Secure Virtual Machine Monitor, Master\u2019s Thesis. Naval Postgraduate School, Monterey, CA, 133 (1999)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Lagar-Cavilla, H.A.e., Tolia, N., Satyanarayanan, M., Lara, E.d.: VMM-Independent Graphics Acceleration. In: Proceedings of the Third International ACM SIGPLAN\/SIGOPS Conference on Virtual Execution Environments (VEE 2007), San Diego, CA (2007)","DOI":"10.1145\/1254810.1254816"},{"key":"31_CR7","unstructured":"Goldberg, I., Wagner, D., Thomas, R., Brewer, E.: A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker). In: Proceedings of the Sixth USENIX UNIX Security Symposium, San Jose, California (1996)"},{"key":"31_CR8","unstructured":"Dan, A., Mohindra, A., Ramaswami, R., Sitaram, D.: ChakraVyuha(CV): A Sandbox Operating System Environment for Controlled Execution of Alien Code. IBM T.J. Watson research center\u00a0 (1997)"},{"key":"31_CR9","unstructured":"Acharya, A., Raje, M.: Mapbox: Using Parameterized Behavior Classes to Confine Applications. In: Proceedings of the 9th USENIX Security Symposium (2000)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Scott, K., Davidson, J.: Safe Virtual Execution using Software Dynamic Translation. In: Computer Security Applications Conference, pp. 209\u2013218 (2002)","DOI":"10.1109\/CSAC.2002.1176292"},{"key":"31_CR11","unstructured":"Provos, N.: Improving Host Security with System Call Policies. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA (2003)"},{"key":"31_CR12","unstructured":"Chiueh, T.-c., Sankaran, H., Neogi, A.: Spout: A Transparent Distributed Execution Engine for Java Applets. In: Proceedings of the 20th International Conference on Distributed Computing Systems, vol.\u00a0394 (2000)"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1109\/32.888632","volume":"26","author":"D. Malkhi","year":"2000","unstructured":"Malkhi, D., Reiter, M.K.: Secure Execution of Java Applets using A Remote Playground. IEEE Transactions on Software Engineering\u00a026, 1197\u20131209 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36606-7","volume-title":"Advances in Computer Systems Architecture","author":"Z. Liang","year":"2003","unstructured":"Liang, Z., Venkatakrishnan, V.N., Sekar, R.: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. In: Omondi, A.R., Sedukhin, S. (eds.) ACSAC 2003. LNCS, vol.\u00a02823, Springer, Heidelberg (2003)"},{"key":"31_CR15","unstructured":"Kernel brk() vulnerability, http:\/\/seclists.org\/lists\/bugtraq\/2003\/Dec\/0064.html"},{"key":"31_CR16","unstructured":"Chen, P.M., Noble, B.D.: When Virtual is Better Than Real. In: 8th Workshop on Hot Topics in Operating Systems (2001)"},{"key":"31_CR17","unstructured":"Dike, J.: A User-mode Port of the Linux Kernel. In: Proceedings of the 4th Annual Linux Showcase & Conference, Atlanta, Georgia, USA (2000)"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Whitaker, A., Shaw, M., Gribble, S.D.: Denali: A Scalable Isolation Kernel. In: Proceedings of the Tenth ACM SIGOPS European Workshop, Saint-Emilion, France (2002)","DOI":"10.1145\/1133373.1133375"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Whitaker, A., Shaw, M., Gribble, S.D.: Denali: Lightweight Virtual Machines for Distributed and Networked Applications. In: Proceedings of the 2002 USENIX Technical Conference (2002)","DOI":"10.1145\/1133373.1133375"},{"key":"31_CR20","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003)","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pp. 164\u2013177. ACM Press, New York (2003)"},{"key":"31_CR21","unstructured":"Biemueller, S., Dannowski, U.: L4-Based Real Virtual Machines - An API Proposal. In: Proceedings of the MIKES 2007: First International Workshop on MicroKernels for Embedded Systems, Sydney, Australia, pp. 36\u201342 (2007)"},{"key":"31_CR22","unstructured":"Bellard, F.: QEMU, a Fast and Portable Dynamic Translator. In: USENIX Association Technical Conference (2005)"},{"key":"31_CR23","unstructured":"Qumranet: KVM: Kernel-based Virtualization Driver (2006)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77048-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T13:14:57Z","timestamp":1737551697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77048-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540770473","9783540770480"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77048-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}