{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:26Z","timestamp":1761611486397,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/fmec.2019.8795365","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T19:23:29Z","timestamp":1565897009000},"page":"271-277","source":"Crossref","is-referenced-by-count":4,"title":["vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment"],"prefix":"10.1109","author":[{"given":"Preeti","family":"Mishra","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"}]},{"given":"Ishita","family":"Verma","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"}]},{"given":"Saurabh","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"}]},{"given":"Varun S.","family":"Rana","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"}]},{"given":"Kavitha","family":"Kadarla","sequence":"additional","affiliation":[{"name":"High Performance Computing Lab, Indian Institute of Technology, Roorkee, India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.117"},{"key":"ref11","article-title":"Virtual machine introspection in a hybrid honeypot architecture","author":"lengyel","year":"2012","journal-title":"CSET"},{"key":"ref12","article-title":"Understanding threats in hypervisor, its forensics mechanism and its research challenges","volume":"119","author":"joshi","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"ref13","first-page":"191","article-title":"A virtual machine introspection based architecture for intrusion detection","volume":"3","author":"garfinkel","year":"2003","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1064979.1065006"},{"key":"ref15","first-page":"211","article-title":"Detecting anomalies in IaaS environments through virtual machine host system call analysis","author":"alarifi","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.004"},{"journal-title":"Rootkits Subverting the Windows Kernel","year":"2006","author":"hoglund","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/CSAC.2004.19","article-title":"Detecting kernel-level rootkits through binary analysis","author":"kruegel","year":"2004","journal-title":"Computer Security Applications Conference 2004 20th Annual"},{"key":"ref19","first-page":"137","article-title":"Snort: an open source network security tool for intrusion detection in campus network environment","volume":"2","author":"rani","year":"2012","journal-title":"International Journal of Computer Technology and Electronics Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.134"},{"journal-title":"XenAccess Library","year":"2009","author":"payne","key":"ref6"},{"key":"ref5","first-page":"300","article-title":"Unobservable intrusion detection based on call traces in paravirtualized systems","author":"maiero","year":"2011","journal-title":"Proceedings of the International Conference on Security and Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.119"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25141-2_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073805"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"journal-title":"BackTrack 4 Assuring Security by Penetration Testing Master the Art of Penetration Testing with BackTrack","year":"2011","author":"ali","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342267"},{"journal-title":"Clamav","year":"2004","author":"kojm","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"ref23","first-page":"287","article-title":"Barecloud: bare-metal analysis-based evasive malware detection","author":"kirat","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref26","article-title":"Debugging with Gdb: The Gnu Source-level Debugger Fifth Edition, for Gdb Version, April 1998","author":"stallman","year":"2000","journal-title":"iUniverse Com"},{"key":"ref25","first-page":"1","author":"deshane","year":"2008","journal-title":"Quantitative Comparison of Xen and KVM"}],"event":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2019,6,10]]},"location":"Rome, Italy","end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8787850\/8795303\/08795365.pdf?arnumber=8795365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:30:36Z","timestamp":1755714636000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8795365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/fmec.2019.8795365","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}