{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T03:47:32Z","timestamp":1766720852011,"version":"3.37.3"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tcc.2021.3067829","type":"journal-article","created":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T20:37:52Z","timestamp":1616445472000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Blue-Pill Oxpecker: A VMI Platform for Transactional Modification"],"prefix":"10.1109","volume":"11","author":[{"given":"Seyed Mohammad","family":"AghamirMohammadAli","sequence":"first","affiliation":[{"name":"S4Lab, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"}]},{"given":"Behnam","family":"Momeni","sequence":"additional","affiliation":[{"name":"S4Lab, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"}]},{"given":"Solmaz","family":"Salimi","sequence":"additional","affiliation":[{"name":"S4Lab, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1773-8314","authenticated-orcid":false,"given":"Mehdi","family":"Kharrazi","sequence":"additional","affiliation":[{"name":"S4Lab, Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BPM.2013.6615011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046751"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2517326.2451534"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050766"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.26"},{"key":"ref11","first-page":"85","article-title":"HYPERSHELL: A practical hypervisor layer guest OS shell for automated in-VM management","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Fu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2758356"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.59"},{"key":"ref14","first-page":"642","article-title":"Family buphagidae (Oxpeckers)","volume-title":"Handbook of the Birds of the World","author":"Elliott","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2013.6890868"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3153-3_55"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.45"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835951"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/173682.165164"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382234"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576196"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2016.035"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.49"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"article-title":"Practical protection of kernel integrity for commodity OS from untrusted extensions","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Xiong","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.07.019"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368517"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.59"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950398"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2416728"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046751"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.119"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/289.291"},{"article-title":"The volatility framework: Volatile memory artifact extraction utility framework","year":"2019","author":"Walters","key":"ref42"},{"key":"ref44","first-page":"225","article-title":"KVM: The Linux virtual machine monitor","volume-title":"Proc. Linux Symp.","author":"Kivity"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2172\/1055635"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25141-2_7"},{"key":"ref48","article-title":"Rekall memory forensics framework","author":"Cohen","year":"2019","journal-title":"DFIR Prague"},{"article-title":"TPC benchmark\u2122 H standard specification version 2.18.0, 2018,","year":"2021","author":"Council","key":"ref49"},{"article-title":"TPC-H benchmark kit with some modifications\/additions.","year":"2021","author":"Rahn","key":"ref51"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10061174\/09382893.pdf?arnumber=9382893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:19:16Z","timestamp":1704842356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9382893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2021.3067829","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}