{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:01:50Z","timestamp":1773086510258,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T00:00:00Z","timestamp":1213660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,17]]},"DOI":"10.1145\/1622103.1622109","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:23:22Z","timestamp":1254853402000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["MobiVMM"],"prefix":"10.1145","author":[{"given":"Seehwan","family":"Yoo","sequence":"first","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, China"}]},{"given":"Cheol-Ho","family":"Hong","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Chuck","family":"Yoo","sequence":"additional","affiliation":[{"name":"Korea University, South Korea"}]},{"given":"Yongguang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, China"}]}],"member":"320","published-online":{"date-parts":[[2008,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_2_1","volume-title":"6th Linux. Conf. Au","author":"C.","year":"2005","unstructured":"C. v. S. Ben Leslie and G. Heiser. Wombat: a portable user-mode linux for embedded systems . In 6th Linux. Conf. Au , Canberra , Apr. 2005 . C. v. S. Ben Leslie and G. Heiser. Wombat: a portable user-mode linux for embedded systems. In 6th Linux. Conf. Au, Canberra, Apr. 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359562"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435462"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTMOBILE.2007.14"},{"key":"e_1_3_2_1_6_1","volume-title":"Fast secure virtualization for the arm platform. Master's thesis","author":"Ferstay D. R.","year":"2006","unstructured":"D. R. Ferstay . Fast secure virtualization for the arm platform. Master's thesis , University of British Columbia , 2006 . D. R. Ferstay. Fast secure virtualization for the arm platform. Master's thesis, University of British Columbia, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.825696"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.276.0530"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435461"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113363"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.64"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435460"},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft. Microsoft Virtual PC. http:\/\/www.microsoft.com\/windows\/products\/winfamily\/virtualpc\/default.mspx.  Microsoft. Microsoft Virtual PC . http:\/\/www.microsoft.com\/windows\/products\/winfamily\/virtualpc\/default.mspx."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346258"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361073"},{"key":"e_1_3_2_1_16_1","volume-title":"Cyber-criminals target mobile banking","author":"Tower Group","year":"2007","unstructured":"Tower Group . Cyber-criminals target mobile banking , 2007 . http:\/\/www.vnunet.com\/vnunet\/news\/2173161\/cyber-criminals-targetmobile. Tower Group. Cyber-criminals target mobile banking, 2007. http:\/\/www.vnunet.com\/vnunet\/news\/2173161\/cyber-criminals-targetmobile."},{"key":"e_1_3_2_1_17_1","unstructured":"Trango. Trango: secured virtualization on ARM. http:\/\/www.trango-vp.com.  Trango. Trango: secured virtualization on ARM . http:\/\/www.trango-vp.com."},{"key":"e_1_3_2_1_18_1","volume-title":"Workshop on Microkernels for Embedded Systems","author":"van Schaik C.","year":"2007","unstructured":"C. van Schaik and G. Heiser . High-performance microkernels and virtualisation on arm and segmented architectures . In Workshop on Microkernels for Embedded Systems , Sydney, Australia , Jan. 2007 . C. van Schaik and G. Heiser. High-performance microkernels and virtualisation on arm and segmented architectures. In Workshop on Microkernels for Embedded Systems, Sydney, Australia, Jan. 2007."},{"key":"e_1_3_2_1_19_1","unstructured":"VirtualLogix. VirtualLogix Real-Time Virtualization and VLX. http:\/\/www.osware.com.  VirtualLogix. VirtualLogix Real-Time Virtualization and VLX . http:\/\/www.osware.com."},{"key":"e_1_3_2_1_20_1","unstructured":"VMWare. VMware ESX Server. http:\/\/www.vmware.com\/products\/vi\/esx.  VMWare. VMware ESX Server . http:\/\/www.vmware.com\/products\/vi\/esx."}],"event":{"name":"Mobisys08: The 6th International Conference on Mobile Systems, Applications, and Services","location":"Breckenridge Colorado","acronym":"Mobisys08","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the First Workshop on Virtualization in Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1622103.1622109","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1622103.1622109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:31Z","timestamp":1750249411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1622103.1622109"}},"subtitle":["a virtual machine monitor for mobile phones"],"short-title":[],"issued":{"date-parts":[[2008,6,17]]},"references-count":20,"alternative-id":["10.1145\/1622103.1622109","10.1145\/1622103"],"URL":"https:\/\/doi.org\/10.1145\/1622103.1622109","relation":{},"subject":[],"published":{"date-parts":[[2008,6,17]]},"assertion":[{"value":"2008-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}