{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:37:44Z","timestamp":1730198264759,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/aqtr.2018.8402797","type":"proceedings-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T14:05:57Z","timestamp":1532959557000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Fast switch into a trustworthy virtual machine for running security-sensitive applications"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Pop","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Colesa","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Lutas","sequence":"additional","affiliation":[]},{"given":"Alexandru","family":"Gurzou","sequence":"additional","affiliation":[]},{"given":"Sandor","family":"Lukacs","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Tosa","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Ticle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-642-30921-2_3","article-title":"Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms","author":"vasudevan","year":"2012","journal-title":"Proceedings of the 5th International Conference on Trust and Trustworthy Computing ser TRUST'12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958202"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"ref16","first-page":"1","article-title":"Server-Triggered Trusted User Confirmation of Transactions Performed on Remote Sites","author":"colesa","year":"2015","journal-title":"Automation Computers Applied Mathematics (ACAM)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655150"},{"key":"ref3","first-page":"191","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","author":"garfinkel","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346269"},{"key":"ref5","first-page":"1","article-title":"U-HIPE: Hypervisor-Based Protection of User-Mode Processes in Windows","author":"lutas","year":"2015","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"journal-title":"Accountability and Freedom","year":"2005","author":"lampson","key":"ref8"},{"key":"ref7","article-title":"Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture","author":"vogl","year":"2012","journal-title":"Proceedings of the 2012 European Workshop on System Security (EuroSec'12)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"ref1","first-page":"28","article-title":"What Virtualization Can Do for Security","volume":"32","author":"garfinkel","year":"2007","journal-title":"LOGIN The USENIX Magazine"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592773"}],"event":{"name":"2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)","start":{"date-parts":[[2018,5,24]]},"location":"Cluj-Napoca","end":{"date-parts":[[2018,5,26]]}},"container-title":["2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8398195\/8402681\/08402797.pdf?arnumber=8402797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:17:56Z","timestamp":1598235476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8402797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/aqtr.2018.8402797","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}