{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:09Z","timestamp":1730274129783,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/isie.2018.8433832","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:04:17Z","timestamp":1534197857000},"page":"645-650","source":"Crossref","is-referenced-by-count":0,"title":["DIHyper: Providing Lifetime Hypervisor Data Integrity"],"prefix":"10.1109","author":[{"given":"Jose","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Jose","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Tavares","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref11","first-page":"536","article-title":"Data is flowing in the wind: A review of data-flow integrity methods to overcome non-control-data attacks","author":"d\u00edez-franco","year":"2016","journal-title":"Proceedings of the International Conference of European Transnational Education"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/SP.2008.24","article-title":"Lares: An architecture for secure active monitoring using virtualization","author":"payne","year":"2008","journal-title":"2008 IEEE Symposium on Security and Privacy (sp 2008)"},{"key":"ref16","first-page":"275","article-title":"Cyclone: A safe dialect of c","author":"jim","year":"2002","journal-title":"USENIX Annual Technical Conference General Track"},{"key":"ref17","first-page":"51","article-title":"Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors","author":"akritidis","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref18","first-page":"147","article-title":"Securing software by enforcing data-flow integrity","author":"castro","year":"2006","journal-title":"Proceedings of the 7th symposium on Operating systems design and implementation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2617308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics6040093"},{"key":"ref8","article-title":"Non-Control-Data Attacks Are Realistic Threats","volume":"14","author":"chen","year":"2005","journal-title":"Proceedings of the 14th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2018.8352425"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2014.6871203"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024925"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref20","first-page":"263","article-title":"Preventing Memory Error Exploits with WIT","author":"akritidis","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2018 IEEE 27th International Symposium on Industrial Electronics (ISIE)","start":{"date-parts":[[2018,6,13]]},"location":"Cairns, QLD","end":{"date-parts":[[2018,6,15]]}},"container-title":["2018 IEEE 27th International Symposium on Industrial Electronics (ISIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8419226\/8433439\/08433832.pdf?arnumber=8433832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:00:39Z","timestamp":1643209239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isie.2018.8433832","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}