{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T10:47:33Z","timestamp":1761994053647,"version":"build-2065373602"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732288","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"1674-1681","source":"Crossref","is-referenced-by-count":6,"title":["Extended-HyperWall: Hardware support for rollback secure virtualization"],"prefix":"10.1109","author":[{"given":"Shubham","family":"Shoundic","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Priya","family":"Chandran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Payas","family":"Krishna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinod","family":"Reddy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bodasingi","family":"Jayachandra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lakshit","family":"Pande","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"223","article-title":"Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments","author":"weng minglu li","year":"2010","journal-title":"2010 Fifth Annual ChinaGrid Conference (ChinaGrid)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155652"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/5.964437"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.267"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215385"},{"journal-title":"Introduction to Virtual Machines Virtua Machines","year":"2005","author":"smith","key":"ref16"},{"journal-title":"Xen Kernel Description","first-page":"2010","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232562"},{"journal-title":"Implementation of Extended-HyperWall architecture for Improving the Security of Virtual Machines National Institute Of Technology-Calicut Bachelor's Project Department of Computer Science and Engineering","year":"2015","author":"krishna","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MC.2005.176","article-title":"Virtual Machine Monitors: Current Technology and Future Trends","volume":"38","author":"garfinkel","year":"2005","journal-title":"IEEE Computer Society"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.173"},{"key":"ref8","first-page":"25","article-title":"Defending Against VM Rollback Attack","author":"xia yutao","year":"2012","journal-title":"IEEE\/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W)"},{"key":"ref7","first-page":"20","article-title":"When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments","author":"garfinkel","year":"2005","journal-title":"Proceedings of the 10th conference on Hot Topics in Operating Systems"},{"year":"2015","author":"shoundic","key":"ref2"},{"journal-title":"Virtual Machine Security National Institute Of Technology-Calicut Bachelor's Project Department of Computer Science and Engineering","year":"2013","author":"boban","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732288.pdf?arnumber=7732288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:06:30Z","timestamp":1498359990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732288","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}