{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:07:30Z","timestamp":1725570450064},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_15","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T07:57:18Z","timestamp":1290585438000},"page":"134-141","source":"Crossref","is-referenced-by-count":0,"title":["MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology"],"prefix":"10.1007","author":[{"given":"Taehyoung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Inhyuk","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Changwoo","family":"Min","sequence":"additional","affiliation":[]},{"given":"Young Ik","family":"Eom","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Idika, N., Mathur, A.P.: A Survey of Malware Detection Techniques. Research, Dept. of Computer Science, Purdue Univ. (2007)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.diin.2005.01.006","volume":"2","author":"H. Carvey","year":"2005","unstructured":"Carvey, H.: Malware analysis for windows administrators. Digital Investigation\u00a02, 19\u201322 (2005)","journal-title":"Digital Investigation"},{"key":"15_CR3","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"2003","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing. Prentice Hall, Englewood Cliffs (2003)"},{"key":"15_CR4","unstructured":"Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is Not Transparency: VMM Detection Myths and Realities. In: Proc. of 11th Workshop on Hot Topics in Operating Systems (2007)"},{"key":"15_CR5","unstructured":"Ferrie, P.: Anti-unpacker tricks. In: CARO Workshop (2008)"},{"key":"15_CR6","unstructured":"Ferrie, P.: Attacks on Virtual Machines. In: AVAR Conf., pp. 128\u2013143 (2006)"},{"key":"15_CR7","unstructured":"Listion, T., Skoudis, E.: On the Cutting Edge: Thwarting Virtual Machine Detection. SANS Internet Storm Center (2006)"},{"key":"15_CR8","unstructured":"Chen, X., Andersen, J., Mao, Z.M., Bailey, M., Nazario, J.: Towards an Understanding of Anti-virtualization and Anti-debugging Behavior in Morden Malware. In: DSN 2008, pp. 117\u2013186 (2008)"},{"key":"15_CR9","unstructured":"Xu, M., Malyugin, V., Sheldon, J., Venkitachalam, G., Weissman, B.: ReTrace: Collecting Execution Trace with Virtual Machine Deterministic Replay. In: Proc. of 2007 Workshop on Modeling, Benchmarking and Simulation (2007)"},{"key":"15_CR10","unstructured":"BitBlaze Binary Analysis Platform, \n                  \n                    http:\/\/bitblaze.cs.berkeley.edu"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kang, M.G., Poosankam, P., Yin, H.: Renovo: A Hidden Code Extractor for Packed Executables. In: Proc. of WORM (2007)","DOI":"10.1145\/1314389.1314399"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, X., Wang, X., Xu, D.: Stealthy Malware Detection Through VMM-Based Out-of-the-Box Semantic View Reconstruction. In: Proc. of CCS, pp. 128\u2013138 (2007)","DOI":"10.1145\/1315245.1315262"},{"key":"15_CR13","unstructured":"Bayer, U., Kruegel, C., Kirda, E.: TTanalyze: A Tool for Analyzing Malware. In: Proc. of EICAR, pp.180\u2013192 (2006)"},{"key":"15_CR14","unstructured":"Instrumentation Framework for building dynamic analysis tools, \n                  \n                    http:\/\/valgrind.org"},{"key":"15_CR15","unstructured":"A Dynamic Binary Instrumentation Tool, \n                  \n                    http:\/\/pintool.org"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: Malware Analysis via Hardware Virtualization Extensions. In: Proc. of ACM CCS (2008)","DOI":"10.1145\/1455770.1455779"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T06:30:18Z","timestamp":1553236218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}