{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:18:49Z","timestamp":1740100729187,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T00:00:00Z","timestamp":1651622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.1109\/cscwd54268.2022.9776255","type":"proceedings-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T19:39:11Z","timestamp":1653075551000},"page":"914-919","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Hardware-Assisted Virtualization Based on Low-Level Feature"],"prefix":"10.1109","author":[{"given":"Xiaojie","family":"Tao","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Ru","family":"Xie","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"369","article-title":"Attacks on more virtual machine emulators","volume":"55","author":"ferrie","year":"2007","journal-title":"Symantec Technology Exchange"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3004264"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PRIMEASIA.2017.8280360"},{"key":"ref14","article-title":"Where am i? operating system and virtualization identification without system calls","author":"wright","year":"2017","journal-title":"Proc of the Cyber Security Symposium"},{"year":"0","key":"ref15","article-title":"BluePill detection in two easy steps"},{"article-title":"Redpill: Detect vmm using (almost) one cpu instruction","year":"2004","author":"rutkowska","key":"ref16"},{"year":"0","key":"ref17","article-title":"NO Pill"},{"key":"ref18","article-title":"Threats to virtual environments","volume":"1","author":"wueest","year":"2014","journal-title":"Symantec Security Response Version 1 4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"ref4","first-page":"1057","article-title":"Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence","author":"graziano","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref2","article-title":"Secure virtual machine architecture reference manual","volume":"33047","author":"virtualization","year":"2005","journal-title":"AMD Publication"},{"key":"ref1","article-title":"Intel 64 and ia-32 architectures software developer&#x2019;s manual","author":"manual","year":"2011","journal-title":"NTIS order number"},{"article-title":"Revisiting Microarchitectural Side-Channels","year":"0","author":"haller","key":"ref9"},{"key":"ref20","first-page":"1","article-title":"nether: In-guest detection of out-of-the-guest malware analyzers","author":"p\u00e9k","year":"2011","journal-title":"Proceedings of the Fourth European Workshop on System Security"},{"key":"ref22","article-title":"Compatibility is not transparency: Vmm detection myths and realities","author":"garfinkel","year":"2007","journal-title":"HOTOS"},{"key":"ref21","first-page":"23","article-title":"Introducing blue pill","volume":"22","author":"rutkowska","year":"2006","journal-title":"The official blog of the invisiblethings org"}],"event":{"name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2022,5,4]]},"location":"Hangzhou, China","end":{"date-parts":[[2022,5,6]]}},"container-title":["2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9775971\/9776016\/09776255.pdf?arnumber=9776255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:13:19Z","timestamp":1655154799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9776255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cscwd54268.2022.9776255","relation":{},"subject":[],"published":{"date-parts":[[2022,5,4]]}}}