{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:37Z","timestamp":1750307617369,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,31]],"date-time":"2009-03-31T00:00:00Z","timestamp":1238457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,31]]},"DOI":"10.1145\/1518684.1518689","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"24-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Extending virtualization services with trust guarantees via behavioral monitoring"],"prefix":"10.1145","author":[{"given":"Himanshu","family":"Raj","sequence":"first","affiliation":[{"name":"Georgia Tech, Atlanta, GA"}]},{"given":"Karsten","family":"Schwan","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2009,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SNORT Intrusion Detection System. www.snort.org.  SNORT Intrusion Detection System. www.snort.org."},{"key":"e_1_3_2_1_2_1","unstructured":"Trusted Platform Module (TPM) Specification. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM.  Trusted Platform Module (TPM) Specification. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM."},{"key":"e_1_3_2_1_3_1","unstructured":"XenAccess Library. http:\/\/xenaccess.sourceforge.net\/.  XenAccess Library. http:\/\/xenaccess.sourceforge.net\/."},{"volume-title":"Proc. of FAST","year":"2003","author":"Aguilera M. K.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"volume-title":"Usenix Security Symposium","year":"2006","author":"Berger S.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proc. of the 4th Annual Linux Showcase and Conference","year":"2000","author":"Carns P. H.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238060"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.25"},{"volume-title":"Proc. of 15th NIST-NCSC National Computer Security Conference","year":"1992","author":"Ferraiolo D.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346271"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168861"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352608"},{"volume-title":"Proc. of ACSAC","year":"2006","author":"McCune J.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294287"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278901.1278905"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453775.1453781"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"volume-title":"Usenix Security Symposium","year":"2004","author":"Sailer R.","key":"e_1_3_2_1_23_1"}],"event":{"name":"EuroSys '09: Fourth EuroSys Conference 2009","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Nuremberg Germany","acronym":"EuroSys '09"},"container-title":["Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1518684.1518689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1518684.1518689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:46Z","timestamp":1750250746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1518684.1518689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,31]]},"references-count":21,"alternative-id":["10.1145\/1518684.1518689","10.1145\/1518684"],"URL":"https:\/\/doi.org\/10.1145\/1518684.1518689","relation":{},"subject":[],"published":{"date-parts":[[2009,3,31]]},"assertion":[{"value":"2009-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}