{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:44:10Z","timestamp":1770219850019,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-08-9-0009"],"award-info":[{"award-number":["FA8750-08-9-0009"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558667","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["External monitoring of endpoint configuration compliance"],"prefix":"10.1145","author":[{"given":"Darrell M.","family":"Kienzle","sequence":"first","affiliation":[{"name":"Symantec Corporation, Herndon, VA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryan K.","family":"Persaud","sequence":"additional","affiliation":[{"name":"Symantec Corporation, Herndon, VA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthew C.","family":"Elder","sequence":"additional","affiliation":[{"name":"Symantec Corporation, Herndon, VA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876409"},{"key":"e_1_3_2_1_2_1","volume-title":"10th Network and Distributed System Security","author":"Garfinkel T.","year":"2003","unstructured":"Garfinkel , T. and M. Rosenblum . \" A virtual machine introspection based architecture for intrusion detection \". 10th Network and Distributed System Security , Feb. 2003 . Garfinkel, T. and M. Rosenblum. \"A virtual machine introspection based architecture for intrusion detection\". 10th Network and Distributed System Security, Feb. 2003."},{"key":"e_1_3_2_1_3_1","unstructured":"Ivman. ivman.sourceforge.net.  Ivman. ivman.sourceforge.net."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.12.002"},{"key":"e_1_3_2_1_6_1","volume-title":"17th USENIX Security Symposium","author":"Litty L.","year":"2008","unstructured":"Litty , L. , A. Lagar-Cavilla , and D. Lie . \" Hypervisor Support for Identifying Covertly Executing Binaries \". 17th USENIX Security Symposium , Jul. 2008 . Litty, L., A. Lagar-Cavilla, and D. Lie. \"Hypervisor Support for Identifying Covertly Executing Binaries\". 17th USENIX Security Symposium, Jul. 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Hack In The Box Security Conference 2005 -- Malaysia","author":"Rutkowska J.","year":"2005","unstructured":"Rutkowska , J. \"System Virginity Verifier\". Hack In The Box Security Conference 2005 -- Malaysia , Sep. 2005 . Rutkowska, J. \"System Virginity Verifier\". Hack In The Box Security Conference 2005 -- Malaysia, Sep. 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"www.trustedcomputinggroup.org","author":"Trusted Computing Group","year":"2008","unstructured":"Trusted Computing Group . \" Trusted Platform Module (TPM) Summary\" , www.trustedcomputinggroup.org , 2008 . Trusted Computing Group. \"Trusted Platform Module (TPM) Summary\", www.trustedcomputinggroup.org, 2008."}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '09"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":8,"alternative-id":["10.1145\/1558607.1558667","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558667","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}