{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:09:42Z","timestamp":1725628182670},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766638","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"906-911","source":"Crossref","is-referenced-by-count":6,"title":["Are there good reasons for protecting mobile phones with hypervisors?"],"prefix":"10.1109","author":[{"given":"Christian","family":"Gehrmann","sequence":"first","affiliation":[]},{"given":"Heradon","family":"Douglas","sequence":"additional","affiliation":[]},{"given":"Dennis Kengo","family":"Nilsson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"ref12","first-page":"243","article-title":"Hypervisor Support for Identifying Covertly Executing Binaries","author":"litty","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435462"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784874"},{"year":"0","key":"ref15"},{"article-title":"Benchmarks: How not to do them","year":"0","author":"heiser","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.64"},{"year":"0","key":"ref4"},{"journal-title":"Virtual Machines Versatile Platforms for Systems and Processes","year":"2005","author":"smith","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435461"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"year":"0","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266852"},{"key":"ref1","article-title":"Current trends in cyber attacks on mobile and embedded systems","author":"stammberger","year":"2009","journal-title":"Embedded Computing Design"},{"key":"ref20","article-title":"An empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments","author":"ormandy","year":"2007","journal-title":"CanSecWest"},{"year":"0","key":"ref22"},{"key":"ref21","article-title":"Mobile Platform Security","author":"gehrmann","year":"2006","journal-title":"Ericsson Review"},{"journal-title":"ST-Ericsson U8500 smart phone platform","year":"0","key":"ref23"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766638.pdf?arnumber=5766638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:35:14Z","timestamp":1490081714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766638","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}