{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:08:26Z","timestamp":1759133306148,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB1010000"],"award-info":[{"award-number":["2017YFB1010000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772053","61370059"],"award-info":[{"award-number":["61772053","61370059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013287","name":"Science Challenge Project","doi-asserted-by":"crossref","award":["TZ2017002"],"award-info":[{"award-number":["TZ2017002"]}],"id":[{"id":"10.13039\/501100013287","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2865879","type":"journal-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T18:39:19Z","timestamp":1534444759000},"page":"51776-51790","source":"Crossref","is-referenced-by-count":3,"title":["COW-IMM: A Novel Integrity Measurement Method Based on Copy-on-Write for File in Virtual Machine"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5823-2037","authenticated-orcid":false,"given":"Shupan","family":"Li","sequence":"first","affiliation":[]},{"given":"Limin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Guangjun","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Shubin","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"VirtualBox: Bits and bytes masquerading as machines","volume":"2008","author":"watson","year":"2008","journal-title":"Linux J"},{"key":"ref32","first-page":"164","article-title":"Xen and the art of virtualization","volume":"36","author":"paul","year":"2003","journal-title":"Proc Symp Oper Syst Principles"},{"key":"ref31","first-page":"41","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proc FREENIX Track USENIX Annu Tech Conf"},{"key":"ref30","first-page":"225","article-title":"KVM: The Linux virtual machine monitor","volume":"1","author":"qumranet","year":"2007","journal-title":"Proc Linux Symp"},{"journal-title":"Iozone Filesystem Benchmark","year":"2003","author":"norcott","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.143"},{"key":"ref11","first-page":"324","article-title":"Secure and privacy-aware multiplexing of hardware-protected TPM integrity measurements among virtual machines","author":"velten","year":"2012","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref12","first-page":"305","article-title":"vTPM: Virtualizing the trusted platform module","volume":"15","author":"berger","year":"2006","journal-title":"Proc Usenix Security Symp"},{"key":"ref13","first-page":"191","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"tal","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.119"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"ref16","first-page":"1","article-title":"Antfarm: Tracking processes in a virtual machine environment","volume":"56","author":"jones","year":"2006","journal-title":"Proc Annu Conf USENIX Annu Tech Conf"},{"key":"ref17","first-page":"191","article-title":"IVirt: Runtime environment integrity measurement mechanism based on virtual machine introspection","volume":"38","author":"jie","year":"2015","journal-title":"Chin J Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2516951.2505124"},{"key":"ref28","first-page":"116","article-title":"The main data structure of NTFS file system","volume":"8","author":"liang","year":"2003","journal-title":"Comput Eng Appl"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.176"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2501620.2501623"},{"key":"ref3","first-page":"187","article-title":"Copy-on-write for sprite","volume":"88","author":"nelson","year":"1988","journal-title":"Proc Summer Usenix"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.53"},{"journal-title":"Ext4 Disk Layout","year":"2018","key":"ref29"},{"key":"ref5","first-page":"179","article-title":"Copilot: A coprocessor-based kernel runtime integrity monitor","author":"petroni","year":"2004","journal-title":"Proc Usenix Security Symp"},{"journal-title":"TPM Specification Version 1 2","year":"2013","key":"ref8"},{"journal-title":"TPM Specification Version 1 2","year":"2003","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"ref9","first-page":"223","article-title":"Design and implementation of a TCG-based integrity measurement architecture","volume":"13","author":"sailer","year":"2004","journal-title":"Proc Usenix Secur Symp"},{"key":"ref1","first-page":"492","author":"rivest","year":"1992","journal-title":"The MD5 Message-Digest Algorithm"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"journal-title":"Mounting QCOW2 Images","year":"2016","author":"nanni","key":"ref22"},{"journal-title":"Libguestfs tools for accessing and modifying virtual machine disk images","year":"2009","author":"jones","key":"ref21"},{"key":"ref24","first-page":"25","article-title":"ext4: The next generation of the ext3 file system","author":"mathur","year":"2007","journal-title":"Proc USENIX Assoc Conf"},{"journal-title":"The QCOW Image Format","year":"2018","key":"ref23"},{"journal-title":"All About VDIs","year":"2008","key":"ref26"},{"journal-title":"Virtual Disk Format 5 0","year":"2011","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08438449.pdf?arnumber=8438449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:34:00Z","timestamp":1643182440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8438449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2865879","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}