{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:35Z","timestamp":1750307615026,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456482.1456486","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficiently tracking application interactions using lightweight virtualization"],"prefix":"10.1145","author":[{"given":"Yih","family":"Huang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Anup K.","family":"Ghosh","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1346256.1346269"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1315245.1315262"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_4_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Garfinkel M.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Network and Distributed System Security Symposium (NDSS) , San Diego, CA , Feb. 2003 . T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/844128.844148"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1047915.1047918"},{"key":"e_1_3_2_1_7_1","first-page":"385","volume-title":"Annual Computer Security Applications Conference (ACSAC), 2007","author":"Payne B.D.","year":"2007","unstructured":"Payne , B.D. ; de Carbone , M.D.P. ; Wenke Lee , \"Secure and Flexible Monitoring of Virtual Machines,\" Annual Computer Security Applications Conference (ACSAC), 2007 . pp. 385 -- 397 , Dec. 2007 . Payne, B.D.; de Carbone, M.D.P.; Wenke Lee, \"Secure and Flexible Monitoring of Virtual Machines,\" Annual Computer Security Applications Conference (ACSAC), 2007. pp.385--397, Dec. 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"MA","author":"Jones A. C.","year":"2006","unstructured":"S. T. Jones , A. C. Arpaci-Dusseau , and R. H. Arpaci-Dusseau . \" Antfarm: Tracking processes in a virtual machine environment,\" In USENIX Annual Technical Conference, Boston , MA , June 2006 . S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. \"Antfarm: Tracking processes in a virtual machine environment,\" In USENIX Annual Technical Conference, Boston, MA, June 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_10_1","volume-title":"CA","author":"Samuel T.","year":"2005","unstructured":"Samuel T. King , George W. Dunlap , and Peter M. Chen . \"Debugging operating systems with time-traveling virtual machines,\" In Proceedings of Unenix'05, Anaheim , CA , April 2005 . Samuel T. King, George W. Dunlap, and Peter M. Chen. \"Debugging operating systems with time-traveling virtual machines,\" In Proceedings of Unenix'05, Anaheim, CA, April 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1294261.1294289"},{"key":"e_1_3_2_1_12_1","volume-title":"Surfers Paradise","author":"Jiang X.","year":"2007","unstructured":"X. Jiang and X. Wang . \" Out-of-the-box monitoring of VM-based high-interaction honeypots,\" In 10th International Symposium on Recent Advances in Intrusion Detection (RAID) , Surfers Paradise , Australia , Sept. 2007 . X. Jiang and X. Wang. \"Out-of-the-box monitoring of VM-based high-interaction honeypots,\" In 10th International Symposium on Recent Advances in Intrusion Detection (RAID), Surfers Paradise, Australia, Sept. 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"CA","author":"Jiang X.","year":"2004","unstructured":"Jiang , X. and Xu , D . 2004. \"Collapsar: a VM-based architecture for network attack detention center,\" In Proceedings of the 13th Conference on USENIX Security Symposium, San Diego , CA , August 2004 . Jiang, X. and Xu, D. 2004. \"Collapsar: a VM-based architecture for network attack detention center,\" In Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, August 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1095809.1095825"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1134760.1134765"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceeding of the 16th USENIX Security Symposium","author":"Alexander Moshchuk","year":"2007","unstructured":"Alexander Moshchuk , Tanya Bragin, Damien Deville , Steven D. Gribble , and Henry M. Levy . SpyProxy: Execution-based Detection of Malicious Web Content . In Proceeding of the 16th USENIX Security Symposium , August 2007 . Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, and Henry M. Levy. SpyProxy: Execution-based Detection of Malicious Web Content. In Proceeding of the 16th USENIX Security Symposium, August 2007."},{"key":"e_1_3_2_1_17_1","volume-title":"CA","author":"Forrest S. A.","year":"1996","unstructured":"S. Forrest , S. A. Hofmeyr , A. Somayaji , and T. A. Longstaff . \" A sense of self for UNIX processes,\" In IEEE Symposium on Security and Privacy, Oakland , CA , May 1996 . S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. \"A sense of self for UNIX processes,\" In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_19_1","volume-title":"Surfers Paradise","author":"Mutz W.","year":"2007","unstructured":"D. Mutz , W. Robertson , G. Vigna , and R. Kemmerer . \" Exploiting execution context for the detection of anomalous system calls,\" In 10th International Symposium on Recent Advances in Intrusion Detection (RAID) , Surfers Paradise , Australia , Sept. 2007 . D. Mutz,W. Robertson, G. Vigna, and R. Kemmerer. \"Exploiting execution context for the detection of anomalous system calls,\" In 10th International Symposium on Recent Advances in Intrusion Detection (RAID), Surfers Paradise, Australia, Sept. 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"CA","author":"Giffin S.","year":"2004","unstructured":"J. T. Giffin , S. Jha , and B. P. Miller . \" Efficient context-sensitive intrusion detection,\" In Network and Distributed System Security Symposium (NDSS), San Diego , CA , Feb. 2004 . J. T. Giffin, S. Jha, and B. P. Miller. \"Efficient context-sensitive intrusion detection,\" In Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/IWIA.2005.9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/ICDCSW.2005.62"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1016\/j.comnet.2006.09.013"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1095810.1095826"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1095810.1095833"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1147\/rd.255.0483"},{"unstructured":"VMware http:\/\/www.vmware.com.  VMware http:\/\/www.vmware.com.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/945445.945462"},{"unstructured":"Jeff Dike \"A User-Mode Port of the Linux Kernel \" Proceedings of the 2000 Linux Showcase and Conference October 2000.   Jeff Dike \"A User-Mode Port of the Linux Kernel \" Proceedings of the 2000 Linux Showcase and Conference October 2000.","key":"e_1_3_2_1_29_1"},{"unstructured":"KVM (Kernel-based Virtual Machine). http:\/\/kvm.qumranet.com\/kvmwiki\/Front_Page.  KVM (Kernel-based Virtual Machine). http:\/\/kvm.qumranet.com\/kvmwiki\/Front_Page.","key":"e_1_3_2_1_30_1"},{"issue":"166","key":"e_1_3_2_1_31_1","article-title":"bits and bytes masquerading as machines","volume":"2008","author":"Jon Watson","year":"2008","unstructured":"Jon Watson . VirtualBox : bits and bytes masquerading as machines . Linux Journal , Volume 2008 , Issue 166 , February 2008 . Jon Watson. VirtualBox: bits and bytes masquerading as machines. Linux Journal, Volume 2008, Issue 166, February 2008.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of 2nd Intl. SANE Conference","author":"Poul-Henning Kamp N. M.","year":"2000","unstructured":"Poul-Henning Kamp and Robert N. M. Watson . Jails: Confining the omnipotent root . In Proc. of 2nd Intl. SANE Conference , May 2000 . Poul-Henning Kamp and Robert N. M. Watson. Jails: Confining the omnipotent root. In Proc. of 2nd Intl. SANE Conference, May 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/1272996.1273025"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 18th USENIX Conference on System Administration","author":"Price D.","year":"2004","unstructured":"Price , D. and Tucker , A . 2004. Solaris Zones: Operating System Support for Consolidating Commercial Workloads . In Proceedings of the 18th USENIX Conference on System Administration ( Atlanta, GA, November 14--19 , 2004 ). Price, D. and Tucker, A. 2004. Solaris Zones: Operating System Support for Consolidating Commercial Workloads. In Proceedings of the 18th USENIX Conference on System Administration (Atlanta, GA, November 14--19, 2004)."},{"unstructured":"http:\/\/openvz.org: OpenVZ server virtualization open-source project.  http:\/\/openvz.org: OpenVZ server virtualization open-source project.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/1138041.1138045"},{"unstructured":"Unionfs: http:\/\/www.am-utils.org\/project-unionfs.html  Unionfs: http:\/\/www.am-utils.org\/project-unionfs.html","key":"e_1_3_2_1_38_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS08","name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","location":"Alexandria Virginia USA"},"container-title":["Proceedings of the 1st ACM workshop on Virtual machine security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456482.1456486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456482.1456486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456482.1456486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":38,"alternative-id":["10.1145\/1456482.1456486","10.1145\/1456482"],"URL":"https:\/\/doi.org\/10.1145\/1456482.1456486","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}