{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:03:22Z","timestamp":1740096202138,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_22","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"326-345","source":"Crossref","is-referenced-by-count":10,"title":["acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity"],"prefix":"10.1007","author":[{"given":"Ronald","family":"Toegl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Pirker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Gissing","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1168857.1168860","volume-title":"Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"K. Adams","year":"2006","unstructured":"Adams, K., Agesen, O.: A comparison of software and hardware techniques for x86 virtualization. In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2\u201313. ACM, San Jose (2006)"},{"key":"22_CR2","unstructured":"Advanced Micro Devices: AMD64 Virtualization: Secure Virtual Machine Architecture Reference Manual (May 2005)"},{"issue":"2","key":"22_CR3","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proceedings of the IEEE\u00a094(2), 357\u2013369 (2006), doi:10.1109\/JPROC.2005.862423","journal-title":"Proceedings of the IEEE"},{"key":"22_CR4","first-page":"65","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 65. IEEE Computer Society, Los Alamitos (1997)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164\u2013177. ACM, New York (2003)"},{"key":"22_CR6","first-page":"41","volume-title":"ATEC 2005: Proceedings of the annual conference on USENIX Annual Technical Conference","author":"F. Bellard","year":"2005","unstructured":"Bellard, F.: Qemu, a fast and portable dynamic translator. In: ATEC 2005: Proceedings of the annual conference on USENIX Annual Technical Conference, p. 41. USENIX Association, Berkeley (2005)"},{"key":"22_CR7","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: USENIX-SS 2006: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 305\u2013320 (2006)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-68979-9_2","volume-title":"Trusted Computing - Challenges and Applications","author":"S. Bratus","year":"2008","unstructured":"Bratus, S., D\u2019Cunha, N., Sparks, E., Smith, S.W.: Toctou, traps, and trusted computing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 14\u201332. Springer, Heidelberg (2008)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-14597-1_11","volume-title":"Trusted Systems","author":"S. Cabuk","year":"2010","unstructured":"Cabuk, S., Chen, L., Plaquin, D., Ryan, M.: Trusted integrity measurement and reporting for virtualized platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 180\u2013196. Springer, Heidelberg (2010)"},{"key":"22_CR10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1067170.1067179","volume-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services","author":"R. C\u00e1ceres","year":"2005","unstructured":"C\u00e1ceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating pcs with portable soulpads. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 65\u201378. ACM, Seattle (2005)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-14597-1_10","volume-title":"Trusted Systems","author":"L. Catuogno","year":"2010","unstructured":"Catuogno, L., Dmitrienko, A., Eriksson, K., Kuhlmann, D., Ramunno, G., Sadeghi, A.R., Schulz, S., Schunter, M., Winandy, M., Zhan, J.: Trusted virtual domains - design, implementation and lessons learned. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 156\u2013179. Springer, Heidelberg (2010)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Clair, L.S., Schiffman, J., Jaeger, T., McDaniel, P.: Establishing and sustaining system integrity via root of trust installation. In: Computer Security Applications Conference, Annual, pp. 19\u201329 (2007)","DOI":"10.1109\/ACSAC.2007.25"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-88625-9_1","volume-title":"Information and Communications Security","author":"G. Coker","year":"2008","unstructured":"Coker, G., Guttman, J., Loscocco, P., Sheehy, J., Sniffen, B.: Attestation: Evidence and trust. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 1\u201318. Springer, Heidelberg (2008), http:\/\/dx.doi.org\/10.1007\/978-3-540-88625-9_1"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory (1981)","DOI":"10.1109\/SFCS.1981.32"},{"issue":"10","key":"22_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.955100","volume":"34","author":"J. Dyer","year":"2001","unstructured":"Dyer, J., Lindemann, M., Perez, R., Sailer, R., van Doorn, L., Smith, S.: Building the ibm 4758 secure coprocessor. Computer\u00a034(10), 57\u201366 (2001)","journal-title":"Computer"},{"key":"22_CR16","unstructured":"EMSCB Project Consortium: The European Multilaterally Secure Computing Base (EMSCB) project (2004), http:\/\/www.emscb.org\/"},{"issue":"7","key":"22_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"P. England","year":"2003","unstructured":"England, P., Lampson, B., Manferdelli, J., Willman, B.: A trusted open platform. Computer\u00a036(7), 55\u201362 (2003)","journal-title":"Computer"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68979-9_1","volume-title":"Trusted Computing - Challenges and Applications","author":"P. England","year":"2008","unstructured":"England, P.: Practical techniques for operating system attestation. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 1\u201313. Springer, Heidelberg (2008)"},{"key":"22_CR19","unstructured":"Fruhwirth, C.: New methods in hard disk encryption. Tech. rep., Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology (2005), http:\/\/clemens.endorphin.org\/publications"},{"key":"22_CR20","first-page":"193","volume-title":"Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003)","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of the 19th Symposium on Operating System Principles(SOSP 2003), pp. 193\u2013206. ACM, New York (October 2003)"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1655108.1655110","volume-title":"Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing","author":"C. Gebhardt","year":"2009","unstructured":"Gebhardt, C., Dalton, C.: Lala: a late launch application. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 1\u20138. ACM, Chicago (2009)"},{"key":"22_CR22","volume-title":"3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008)","author":"C. Gebhardt","year":"2008","unstructured":"Gebhardt, C., Tomlinson, A.: Secure Virtual Disk Images for Grid Computing. In: 3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008). IEEE Computer Society, Los Alamitos (October 2008)"},{"key":"22_CR23","volume-title":"Dynamics of a Trusted Platform: A Building Block Approach","author":"D. Grawrock","year":"2009","unstructured":"Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach. Intel Press, Hillsboro (February 2009) ISBN: 978-1934053171"},{"key":"22_CR24","unstructured":"Intel Corporation: Intel active management technology (amt), http:\/\/www.intel.com\/technology\/platform-technology\/intel-amt\/index.htm"},{"key":"22_CR25","unstructured":"Intel Corporation: Trusted Boot (2008), http:\/\/sourceforge.net\/projects\/tboot\/"},{"key":"22_CR26","unstructured":"Intel Corporation: Intel Trusted Execution Technology Software Development Guide (December 2009), http:\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf"},{"key":"22_CR27","first-page":"1","volume-title":"SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"B. Kauer","year":"2007","unstructured":"Kauer, B.: Oslo: improving the security of trusted computing. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1\u20139. USENIX Association, Berkeley (2007)"},{"key":"22_CR28","unstructured":"Kivity, A., Kamay, V., Laor, D., Lublin, U., Liguori, A.: kvm: the Linux Virtual Machine Monitor. In: OLS 2007: Proceedings of the Linux Symposium, pp. 225\u2013230 (2007)"},{"key":"22_CR29","unstructured":"Marchesini, J., Smith, S., Wild, O., MacDonald, R.: Experimenting with tcpa\/tcg hardware, or: How i learned to stop worrying and love the bear. Tech. rep., Department of Computer Science\/Dartmouth PKI Lab, Dartmouth College (2003)"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB reduction and attestation. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2010)","DOI":"10.1109\/SP.2010.17"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352592.1352625","volume-title":"Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, pp. 315\u2013328. ACM, Glasgow (2008)"},{"key":"22_CR32","unstructured":"OpenTC Project Consortium: The Open Trusted Computing (OpenTC) project (2005-2009), http:\/\/www.opentc.net\/"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., Stueble, C., Waidner, M., Weber, A., Saarlandes, U.D.: The perseus system architecture (2001)","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"22_CR34","unstructured":"Pirker, M., Toegl, R., Winkler, T., Vejda, T.: Trusted computing for the Java TM platform (2009), http:\/\/trustedjava.sourceforge.net\/"},{"issue":"4","key":"22_CR35","first-page":"531","volume":"16","author":"M. Pirker","year":"2010","unstructured":"Pirker, M., Toegl, R.: Towards a virtual trusted platform. Journal of Universal Computer Science\u00a016(4), 531\u2013542 (2010), http:\/\/www.jucs.org\/jucs_16_4\/towards_a_virtual_trusted","journal-title":"Journal of Universal Computer Science"},{"key":"22_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-13869-0_18","volume-title":"Trust and Trustworthy Computing","author":"M. Pirker","year":"2010","unstructured":"Pirker, M., Toegl, R., Gissing, M.: Dynamic enforcement of platform integrity (a short paper). In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 265\u2013272. Springer, Heidelberg (2010)"},{"issue":"7","key":"22_CR37","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"G.J. Popek","year":"1974","unstructured":"Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM\u00a017(7), 412\u2013421 (1974)","journal-title":"Commun. ACM"},{"key":"22_CR38","unstructured":"Qumranet: KVM - Kernel-based Virtualization Machine (2006), http:\/\/www.qumranet.com\/files\/white_papers\/KVM_Whitepaper.pdf"},{"key":"22_CR39","unstructured":"Ravi Sahita, U.W., Dewan, P.: Dynamic software application protection. Tech. rep., Intel Corporation (2009), http:\/\/blogs.intel.com\/research\/trusted%20dynamic%20launch-flyer-rlspss_001.pdf"},{"key":"22_CR40","first-page":"67","volume-title":"NSPW","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Hempelmann, C., Raskin, V. (eds.) NSPW, pp. 67\u201377. ACM, New York (2004)"},{"key":"22_CR41","unstructured":"Safford, D., Kravitz, J., Doorn, L.v.: Take control of tcpa. Linux Journal (112), 2 (2003), http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/gsal.TCG.html"},{"key":"22_CR42","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"R. Sailer","year":"2004","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, USENIX Association, San Diego (2004)"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: Tpm virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43\u201356. Vieweg (2007)","DOI":"10.1007\/978-3-8348-9452-6_4"},{"key":"22_CR44","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/ACSAC.2009.18","volume-title":"ACSAC 2009: Proceedings of the 2009 Annual Computer Security Applications Conference","author":"J. Schiffman","year":"2009","unstructured":"Schiffman, J., Moyer, T., Shal, C., Jaeger, T., McDaniel, P.: Justifying integrity using a virtual machine verifier. In: ACSAC 2009: Proceedings of the 2009 Annual Computer Security Applications Conference, pp. 83\u201392. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"22_CR45","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A., Van Doorn, L.: Bind: a fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154\u2013168 (2005)","DOI":"10.1109\/SP.2005.4"},{"key":"22_CR46","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1145\/1217935.1217951","volume-title":"EuroSys 2006: Proceedings of the ACM SIGOPS\/EuroSys European Conference on Computer Systems 2006","author":"L. Singaravelu","year":"2006","unstructured":"Singaravelu, L., Pu, C., H\u00e4rtig, H., Helmuth, C.: Reducing TCB complexity for security-sensitive applications: three case studies. In: EuroSys 2006: Proceedings of the ACM SIGOPS\/EuroSys European Conference on Computer Systems 2006, pp. 161\u2013174. ACM, New York (2006)"},{"key":"22_CR47","unstructured":"Strachey, C.: Time sharing in large, fast computers. In: IFIP Congress (1959)"},{"key":"22_CR48","unstructured":"Trusted Computing Group: TCG infrastructure specifications, https:\/\/www.trustedcomputinggroup.org\/specs\/IWG\/"},{"key":"22_CR49","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)"},{"key":"22_CR50","unstructured":"Tygar, J., Yee, B.: Dyad: A system for using physically secure coprocessors. In: Technological Strategies for the Protection of Intellectual Property in the Networked Multimedia Environment, pp. 121\u2013152. Interactive Multimedia Association (1994)"},{"key":"22_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-13869-0_10","volume-title":"Trust and Trustworthy Computing","author":"A. Vasudevan","year":"2010","unstructured":"Vasudevan, A., McCune, J.M., Qu, N., van Doorn, L., Perrig, A.: Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 141\u2013165. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T00:29:34Z","timestamp":1639700974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}