{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:20:40Z","timestamp":1772644840045,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T00:00:00Z","timestamp":1129766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,20]]},"DOI":"10.1145\/1095810.1095812","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:34:39Z","timestamp":1131366879000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":224,"title":["Pioneer"],"prefix":"10.1145","author":[{"given":"Arvind","family":"Seshadri","sequence":"first","affiliation":[{"name":"CMU\/CyLab"}]},{"given":"Mark","family":"Luk","sequence":"additional","affiliation":[{"name":"CMU\/CyLab"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"CMU\/CyLab"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"CMU\/CyLab"}]},{"given":"Leendert","family":"van Doorn","sequence":"additional","affiliation":[{"name":"IBM"}]},{"given":"Pradeep","family":"Khosla","sequence":"additional","affiliation":[{"name":"CMU\/CyLab"}]}],"member":"320","published-online":{"date-parts":[[2005,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tripwire. http:\/\/sourceforge.net\/projects\/tripwire\/.  Tripwire. http:\/\/sourceforge.net\/projects\/tripwire\/."},{"key":"e_1_3_2_1_2_1","unstructured":"VMware. http:\/\/www.vmware.com\/.  VMware. http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"WinHEC","author":"AMD","year":"2003","unstructured":"AMD platform for trustworthy computing . In WinHEC , September 2003 . AMD platform for trustworthy computing. In WinHEC, September 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"AMD Corp.","author":"Secure","year":"2005","unstructured":"Secure virtual machine architecture reference manual . AMD Corp. , May 2005 . Secure virtual machine architecture reference manual. AMD Corp., May 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"Postmark: A new file system benchmark.","author":"Appliance Network","year":"2004","unstructured":"Network Appliance . Postmark: A new file system benchmark. Available at http:\/\/www.netapp.com\/techlibrary\/3022.html, 2004 . Network Appliance. Postmark: A new file system benchmark. Available at http:\/\/www.netapp.com\/techlibrary\/3022.html, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"May","author":"Arbaugh W.","year":"2005","unstructured":"W. Arbaugh . Personal communication , May 2005 . W. Arbaugh. Personal communication, May 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"February","author":"Boggs D.","year":"2004","unstructured":"D. Boggs , A. Baktha , J. Hawkins , D. Marr , J. Miller , P. Roussel , R. Singhal , B. Toll , and K.S. Venkatraman . The microarchitecture of the Intel Pentium 4 processor on 90nm technology. Intel Technology Journal, 8(01) , February 2004 . D. Boggs, A. Baktha, J. Hawkins, D. Marr, J. Miller, P. Roussel, R. Singhal, B. Toll, and K.S. Venkatraman. The microarchitecture of the Intel Pentium 4 processor on 90nm technology. Intel Technology Journal, 8(01), February 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of HotOS IX","author":"Chen B.","year":"2003","unstructured":"B. Chen and R. Morris . Certifying program execution with secure procesors . In Proceedings of HotOS IX , 2003 . B. Chen and R. Morris. Certifying program execution with secure procesors. In Proceedings of HotOS IX, 2003."},{"issue":"2","key":"e_1_3_2_1_9_1","volume":"28","author":"Chuvakin A.","year":"2003","unstructured":"A. Chuvakin . Ups and downs of unix\/linux host-based security solutions. ;login : The Magazine of USENIX and SAGE , 28 ( 2 ), April 2003 . A. Chuvakin. Ups and downs of unix\/linux host-based security solutions. ;login: The Magazine of USENIX and SAGE, 28(2), April 2003.","journal-title":"The Magazine of USENIX and SAGE"},{"key":"e_1_3_2_1_10_1","unstructured":"Free Software Foundation. superopt - finds the shortest instruction sequence for a given function. http:\/\/www.gnu.org\/directory\/devel\/compilers\/superopt.html.  Free Software Foundation. superopt - finds the shortest instruction sequence for a given function. http:\/\/www.gnu.org\/directory\/devel\/compilers\/superopt.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_12_1","volume-title":"September","author":"Intel Corp.","year":"2003","unstructured":"Intel Corp. LaGrande Technology Architectural Overview , September 2003 . Intel Corp. LaGrande Technology Architectural Overview, September 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"IA32 Intel Architecture Software Developer's Manual","author":"Intel Corporation","unstructured":"Intel Corporation . IA32 Intel Architecture Software Developer's Manual Vol. 1 . Intel Corporation. IA32 Intel Architecture Software Developer's Manual Vol.1."},{"issue":"7","key":"e_1_3_2_1_14_1","volume":"26","author":"Jones K. J.","year":"2001","unstructured":"K. J. Jones . Loadable Kernel Modules . ;login : The Magazine of USENIX and SAGE , 26 ( 7 ), November 2001 . K. J. Jones. Loadable Kernel Modules. ;login: The Magazine of USENIX and SAGE, 26(7), November 2001.","journal-title":"The Magazine of USENIX and SAGE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512566"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Kennell R.","year":"2003","unstructured":"R. Kennell and L. Jamieson . Establishing the genuinity of remote computer systems . In Proceedings of USENIX Security Symposium , August 2003 . R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In Proceedings of USENIX Security Symposium, August 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945467"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/648255.752741"},{"key":"e_1_3_2_1_19_1","first-page":"179","volume-title":"Proceedings of USENIX Security Symposium","author":"Petroni N.","year":"2004","unstructured":"N. Petroni , T. Fraser , J. Molina , and W. Arbaugh . Copilot - a coprocessor-based kernel runtime integrity monitor . In Proceedings of USENIX Security Symposium , pages 179 -- 194 , 2004 . N. Petroni, T. Fraser, J. Molina, and W. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of USENIX Security Symposium, pages 179--194, 2004."},{"key":"e_1_3_2_1_20_1","first-page":"223","volume-title":"Proceedings of USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In Proceedings of USENIX Security Symposium , pages 223 -- 238 , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of USENIX Security Symposium, pages 223--238, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_22_1","first-page":"89","volume-title":"Proceedings of USENIX Security Symposium","author":"Shankar U.","year":"2004","unstructured":"U. Shankar , M. Chew , and J. D. Tygar . Side effects are not sufficient to authenticate software . In Proceedings of USENIX Security Symposium , pages 89 -- 101 , August 2004 . U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In Proceedings of USENIX Security Symposium, pages 89--101, August 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/www.trustedcomputinggroup.org\/","author":"Trusted Computing Group (TCG).","year":"2003","unstructured":"Trusted Computing Group (TCG). https:\/\/www.trustedcomputinggroup.org\/ , 2003 . Trusted Computing Group (TCG). https:\/\/www.trustedcomputinggroup.org\/, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.2"},{"key":"e_1_3_2_1_29_1","unstructured":"D. Zovi. Kernel rootkits. http:\/\/www.cs.unm.edu\/~ghandi\/lkr.pdf.  D. Zovi. Kernel rootkits. http:\/\/www.cs.unm.edu\/~ghandi\/lkr.pdf."}],"event":{"name":"SOSP05: ACM SIGOPS 20th Symposium on Operating Systems Principles 2005","location":"Brighton United Kingdom","acronym":"SOSP05","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the twentieth ACM symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1095810.1095812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1095810.1095812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:27Z","timestamp":1750248507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1095810.1095812"}},"subtitle":["verifying code integrity and enforcing untampered code execution on legacy systems"],"short-title":[],"issued":{"date-parts":[[2005,10,20]]},"references-count":27,"alternative-id":["10.1145\/1095810.1095812","10.1145\/1095810"],"URL":"https:\/\/doi.org\/10.1145\/1095810.1095812","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1095809.1095812","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,10,20]]},"assertion":[{"value":"2005-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}