{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:09:57Z","timestamp":1725570597078},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_18","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T06:45:07Z","timestamp":1291099507000},"page":"241-260","source":"Crossref","is-referenced-by-count":0,"title":["TRIOB: A Trusted Virtual Computing Environment Based on Remote I\/O Binding Mechanism"],"prefix":"10.1007","author":[{"given":"Haifeng","family":"Fang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yiqiang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuzhong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the Art of Virtualization. In: Proc. of the 19th ACM Symp. on Operating Systems Principles 2003, pp. 164\u2013177 (2003)","DOI":"10.1145\/945445.945462"},{"key":"18_CR2","unstructured":"Huizenga, G.: Cloud Computing: Coming out of the fog. In: Proceedings of the Linux Symposium 2008, vol.\u00a01, pp. 197\u2013210 (2008)"},{"key":"18_CR3","unstructured":"Armbrust, M., Fox, A., et al.: Above the Clouds: A Berkeley View of Cloud. Technical Report No. UCB\/EECS-2009-28 (2009)"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"L.M. Kaufman","year":"2009","unstructured":"Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy\u00a07(4), 61\u201364 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., et al.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Pro. of the 19th ACM Symp. on Operating Systems Principles 2003, pp. 193\u2013206 (2003)","DOI":"10.1145\/945445.945464"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An Architecture for Secure Active Monitoring Using Virtualization. In: Proceedings of the IEEE Symposium on Security and Privacy 2008, pp. 233\u2013247 (2008)","DOI":"10.1109\/SP.2008.24"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1341312.1341321","volume":"42","author":"S. Berger","year":"2008","unstructured":"Berger, S., et al.: TVDc: managing security in the trusted virtual datacenter. ACM SIGOPS Operating Systems Review\u00a042(1), 40\u201347 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"18_CR8","unstructured":"Berger, S., Cceres, R., et al.: vTPM: Virtualizing the Trusted Platform Module. In: Proc. of the 15th Conference on USENIX Security Symposium (2006)"},{"key":"18_CR9","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004)"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1453175.1453177","volume":"36","author":"T. Tan","year":"2008","unstructured":"Tan, T., Simmonds, R., et al.: Image Management in a Virtualized Data Center. ACM SIGMETRICS Performance Evaluation Review\u00a036(2), 4\u20139 (2008)","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"18_CR11","unstructured":"Warfield, A., Hand, S., Fraser, K., Deegan, T.: Facilitating the development of soft devices. In: USENIX Annual Technical Conference 2005 (2005)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11704-009-0076-5","volume":"4","author":"Y. Sun","year":"2010","unstructured":"Sun, Y., Fang, H., Song, Y., et al.: TRainbow: a new trusted virtual machine based platform. International Journal Frontiers of Computer Science in China\u00a04(1), 47\u201364 (2010)","journal-title":"International Journal Frontiers of Computer Science in China"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Murray, D.G., Milos, G., Hand, S.: Improving Xen Security through Disaggregation. In: Proc. Of the 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments 2008, pp. 151\u2013160 (2008)","DOI":"10.1145\/1346256.1346278"},{"key":"18_CR14","unstructured":"Garfinkel, T., Rosenblum, M.: A Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proc. of the Network and Distributed Systems Security Symposium 2003, pp. 191\u2013206 (2003)"},{"key":"18_CR15","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2), http:\/\/aws.amazon.com\/ec2\/"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Payne, B., Carbone, M., Lee, W.: Secure and Flexible Monitoring of Virtual Machines. In: Computer Security Applications Conference 2007, pp. 385\u2013397 (2007)","DOI":"10.1109\/ACSAC.2007.10"},{"key":"18_CR17","unstructured":"Jones, S.T., Arpaci-Dusseau, A.C., et al.: Antfarm: Tracking Processes in a Virtual Machine Environment. In: Proc. of USENIX Annual Technical Conference 2006 (2006)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In: Proc. of the 14th ACM Conference on Computer and Communications Security 2007, pp. 128\u2013138 (2007)","DOI":"10.1145\/1315245.1315262"},{"key":"18_CR19","unstructured":"Linux kernel rootkits - protecting the system\u2019s Ring-Zero, http:\/\/www.sans.org\/reading_room\/whitepapers\/honors\/linux-kernel-rootkits-protecting-systems_1500"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Weinhold, C., Hartig, H.: VPFS: building a virtual private file system with a small trusted computing base. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, pp. 81\u201393 (2008)","DOI":"10.1145\/1352592.1352602"},{"key":"18_CR21","unstructured":"Weele, E.V., Lau, B., et al.: Protecting Confidential Data on Personal Computers with Storage Capsules. In: Proceedings of the 18th USENIX Security Symposium 2009 (2009)"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Yang, J., Shin, K.G.: Using Hypervisor to Provide Application Data Secrecy on a Per-Page Basis. In: Pro. of the Fourth International Conference on Virtual Execution Environments 2008, pp. 71\u201380 (2008)","DOI":"10.1145\/1346256.1346267"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Chen, X., Garfinkel, T., et al.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: Proc. of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems 2008, pp. 2\u201313 (2008)","DOI":"10.1145\/1346281.1346284"},{"key":"18_CR24","unstructured":"Chandra, R., Zeldovich, N., Sapuntzakis, C., Lam, M.S.: The collective: a cache-based system management architecture. In: Proc. of the 2nd Conference on Symposium on Networked Systems Design and Implementation 2005, vol. 2, pp. 259\u2013272 (2005)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Kumar, S., Schwan, K.: Netchannel: a VMM-level mechanism for continuous, transparent device access during VM migration. In: Pro. of the Fourth ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments 2008 (2008)","DOI":"10.1145\/1346256.1346261"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Aiken, S., Grunwald, D., Pleszkun, A.R., Willeke, J.: A performance analysis of the iSCSI protocol. IEEE MSST (2003)","DOI":"10.1109\/MASS.2003.1194849"},{"key":"18_CR27","unstructured":"Petroni, N.L., et al.: Copilot: a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th Conference on USENIX Security Symposium (2004)"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., et al.: Pioneer: Verifying Code Integrity and Enforcing Unhampered Code Execution on Legacy Systems. In: The 20th ACM Symposium on Operating Systems Principles (2005)","DOI":"10.1145\/1095810.1095812"},{"key":"18_CR29","unstructured":"Fraser, K., et al.: Safe Hardware Access with the Xen Virtual Machine Monitor. In: Proceedings of the 1st Workshop on Operating System and Architectural Support for the on Demand IT InfraStructure, Boston, MA (2004)"},{"key":"18_CR30","unstructured":"Wojtczuk, R.: Subverting the Xen Hypervisor. Black Hat USA (2008)"},{"key":"18_CR31","unstructured":"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008-3253l"},{"key":"18_CR32","unstructured":"Goodin, D.: Webhost hack wipes out data for 100,000 sites, http:\/\/www.theregister.co.uk\/2009\/06\/08\/webhost_attack"},{"key":"18_CR33","unstructured":"Lineberry, A.: Malicious Code Injection via \/dev\/mem. Black Hat 2009 (2009)"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Milos, G., Murray, D.G.: Boxing clever with IOMMUs. In: Proceedings of the 1st ACM Workshop on Virtual Machine Security 2008, pp. 39\u201344 (2008)","DOI":"10.1145\/1456482.1456489"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Murray, D.G., Hand, S.: Privilege separation made easy: trusting small libraries not big processes. In: Proceedings of the 1st European Workshop on System Security 2008, pp. 40\u201346 (2008)","DOI":"10.1145\/1355284.1355292"},{"issue":"1","key":"18_CR36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1496909.1496918","volume":"43","author":"C.I. Dalton","year":"2009","unstructured":"Dalton, C.I., Plaquin, D., et al.: Trusted virtual platforms: a key enabler for converged client devices. SIGOPS Oper. Syst. Rev.\u00a043(1), 36\u201343 (2009)","journal-title":"SIGOPS Oper. Syst. Rev."}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T13:33:58Z","timestamp":1559828038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}