{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:40:10Z","timestamp":1744069210139,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333828"},{"type":"electronic","value":"9783642333835"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33383-5_11","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T02:51:51Z","timestamp":1346899911000},"page":"168-187","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Anomaly Detection for More Trustworthy Outsourced Computation"],"prefix":"10.1007","author":[{"given":"Sami","family":"Alsouri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"Sinschek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andreas","family":"Sewe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ammons, G., Ball, T., Larus, J.R.: Exploiting hardware performance counters with flow and context sensitive profiling. In: Proc. of the 10th Conference on Programming Language Design and Implementation (PLDI), pp. 85\u201396 (1997)","key":"11_CR1","DOI":"10.1145\/258916.258924"},{"unstructured":"Apache Software Foundation. The Apache Java PDF Library (PDFbox), http:\/\/pdfbox.apache.org\/","key":"11_CR2"},{"unstructured":"Apache Software Foundation. The Java API for Microsoft Documents\u00a0(Apache POI), http:\/\/poi.apache.org\/","key":"11_CR3"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-22792-9_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"S. Benabbas","year":"2011","unstructured":"Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable Delegation of Computation over Large Datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 111\u2013131. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Bodden, E., Sewe, A., Sinschek, J., Oueslati, H., Mezini, M.: Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders. In: Proc. of the 33rd International Conference on Software Engineering (ICSE), pp. 241\u2013250 (2011)","key":"11_CR5","DOI":"10.1145\/1985793.1985827"},{"doi-asserted-by":"crossref","unstructured":"Bond, M.D., McKinley, K.S.: Probabilistic calling context. In: Proc. of the 22nd Conference on Object-Oriented Programming, Systems, Languages and Applications\u00a0(OOPSLA), pp. 97\u2013112 (2007)","key":"11_CR6","DOI":"10.1145\/1297027.1297035"},{"doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. In: Proc. of the 21st International Conference on Software Engineering (ICSE), pp. 213\u2013224 (1999)","key":"11_CR7","DOI":"10.1145\/302405.302467"},{"doi-asserted-by":"crossref","unstructured":"Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly detection using call stack information. In: Proc. of the 2003 IEEE Symposium on Security and Privacy (S&P), pp. 62\u201375 (2003)","key":"11_CR8","DOI":"10.1109\/SECPRI.2003.1199328"},{"unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proc. of the 1996 Symposium on Security and Privacy (S&P), pp. 120\u2013128 (1996)","key":"11_CR9"},{"unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.M.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional (1994)","key":"11_CR10"},{"doi-asserted-by":"crossref","unstructured":"Gao, D., Reiter, M.K., Song, D.: Gray-box extraction of execution graphs for anomaly detection. In: Proc. of the 11th Conference on Computer and Communications Security (CCS), pp. 318\u2013329 (2004)","key":"11_CR11","DOI":"10.1145\/1030083.1030126"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R. Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 465\u2013482. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Gruska, N., Wasylkowski, A., Zeller, A.: Learning from 6,000 projects: Lightweight cross-project anomaly detection. In: Proc. of the 19th International Symposium on Software Testing and Analysis (ISSTA), pp. 119\u2013130 (2010)","key":"11_CR13","DOI":"10.1145\/1831708.1831723"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-14597-1_4","volume-title":"Trusted Systems","author":"L. Gu","year":"2010","unstructured":"Gu, L., Cheng, Y., Ding, X., Deng, R.H., Guo, Y., Shao, W.: Remote Attestation on Function Execution (Work-in-Progress). In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 60\u201372. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proc. of the 3rd Workshop on Scalable Trusted Computing (STC), pp. 11\u201320 (2008)","key":"11_CR15","DOI":"10.1145\/1456455.1456458"},{"doi-asserted-by":"crossref","unstructured":"Gutzmann, T., L\u00f6we, W.: Custom-made instrumentation based on static analysis. In: Proc. of the 9th International Workshop on Dynamic Analysis, WODA (2011)","key":"11_CR16","DOI":"10.1145\/2002951.2002957"},{"unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: Proc. of the 3rd Conference on Virtual Machine Research and Technology Symposium, pp. 3\u201320 (2004)","key":"11_CR17"},{"doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proc. of the 24th International Conference on Software Engineering (ICSE), pp. 291\u2013301 (2002)","key":"11_CR18","DOI":"10.1145\/581339.581377"},{"doi-asserted-by":"crossref","unstructured":"Inoue, H., Forrest, S.: Anomaly intrusion detection in dynamic execution environments. In: Proc. of the 2002 Workshop on New Security Paradigms (NSPW), pp. 52\u201360 (2002)","key":"11_CR19","DOI":"10.1145\/844111.844112"},{"key":"11_CR20","first-page":"47","volume":"179","author":"Y. Karabulut","year":"2007","unstructured":"Karabulut, Y., Kerschbaum, F., Massacci, F., Robinson, P., Yautsiukhin, A.: Security and trust in IT business outsourcing: a manifesto. ENTCS\u00a0179, 47\u201358 (2007)","journal-title":"ENTCS"},{"unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proc. of the International Joint Conference on Artificial Intelligence (IJCAI), pp. 1137\u20131143 (1995)","key":"11_CR21"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jsis.2009.06.002","volume":"18","author":"M.C. Lacity","year":"2009","unstructured":"Lacity, M.C., Khan, S.A., Willcocks, L.P.: A review of the IT outsourcing literature: Insights for practice. The Journal of Strategic Information Systems\u00a018(3), 130\u2013146 (2009)","journal-title":"The Journal of Strategic Information Systems"},{"doi-asserted-by":"crossref","unstructured":"Liang, S., Bracha, G.: Dynamic class loading in the java virtual machine. In: Proc. of the 13th Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA), pp. 36\u201344 (1998)","key":"11_CR23","DOI":"10.1145\/286936.286945"},{"doi-asserted-by":"crossref","unstructured":"Pradel, M., Gross, T.R.: Automatic generation of object usage specifications from large method traces. In: Proc. of the 24th International Conference on Automated Software Engineering (ASE), pp. 371\u2013382 (2009)","key":"11_CR24","DOI":"10.1109\/ASE.2009.60"},{"unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symposium, pp. 1\u201316 (2004)","key":"11_CR25"},{"doi-asserted-by":"crossref","unstructured":"Sarimbekov, A., Sewe, A., Binder, W., Moret, P., Mezini, M.: JP2: Call-site aware calling context profiling for the Java Virtual Machine. Science of Computer Programming (2012), doi:10.1016\/j.scico.2011.11.003","key":"11_CR26","DOI":"10.1016\/j.scico.2011.11.003"},{"doi-asserted-by":"crossref","unstructured":"Sarimbekov, A., Sewe, A., Binder, W., Moret, P., Sch\u00f6berl, M., Mezini, M.: Portable and accurate collection of calling-context-sensitive bytecode metrics for the Java Virtual Machine. In: Proc. of the 9th Conference on the Principles and Practice of Programming in Java (PPPJ), pp. 11\u201320 (2011)","key":"11_CR27","DOI":"10.1145\/2093157.2093160"},{"doi-asserted-by":"crossref","unstructured":"Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: Tpm virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43\u201356. Vieweg+Teubner (2008)","key":"11_CR28","DOI":"10.1007\/978-3-8348-9452-6_4"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-68979-9_3","volume-title":"Trusted Computing - Challenges and Applications","author":"M. Strasser","year":"2008","unstructured":"Strasser, M., Stamer, H.: A Software-Based Trusted Platform Module Emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 33\u201347. Springer, Heidelberg (2008)"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36415-3_1","volume-title":"Information Hiding","author":"K. Tan","year":"2003","unstructured":"Tan, K., McHugh, J., Killourhy, K.: Hiding Intrusions: From the Abnormal to the Normal and Beyond. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 1\u201317. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: Alattin: Mining alternative patterns for detecting neglected conditions. In: Proc. of the 24th International Conference on Automated Software Engineering (ASE), pp. 283\u2013294 (2009)","key":"11_CR31","DOI":"10.1109\/ASE.2009.72"},{"doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: Mining exception-handling rules as sequence association rules. In: Proc. of the 31st International Conference on Software Engineering (ICSE), pp. 496\u2013506 (2009)","key":"11_CR32","DOI":"10.1109\/ICSE.2009.5070548"},{"unstructured":"The tpm4java library, http:\/\/sourceforge.net\/projects\/tpm4java\/","key":"11_CR33"},{"unstructured":"Trusted Computing Group, Inc. TPM Main Specification Level 2 Version 1.2, Revision 116 (March 2011)","key":"11_CR34"},{"unstructured":"The TrustedGRUB extension to the GRUB bootloader, http:\/\/sourceforge.net\/projects\/trustedgrub\/","key":"11_CR35"},{"doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proc. of the 9th Conference on Computer and Communications Security (CCS), pp. 255\u2013264 (2002)","key":"11_CR36","DOI":"10.1145\/586110.586145"},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., Seifert, J.-P., Sandhu, R.: Security enforcement model for distributed usage control. In: Proc. of the Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 10\u201318 (2008)","key":"11_CR37","DOI":"10.1109\/SUTC.2008.79"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33383-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:02:01Z","timestamp":1744066921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33383-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333828","9783642333835"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33383-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}