{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T18:56:20Z","timestamp":1774464980429,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2898445.2898456","type":"proceedings-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T22:58:31Z","timestamp":1464130711000},"page":"10-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware"],"prefix":"10.1145","author":[{"given":"Xiongwei","family":"Xie","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Agobot. http:\/\/www.f-secure.com\/v-descs\/agobot .shtml 2012.  Agobot. http:\/\/www.f-secure.com\/v-descs\/agobot .shtml 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2012.46"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Computing, Communication System and Informatics Management (ICCCSIM)","author":"Alasiri A.","year":"2012"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2012.283.288"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095820"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"e_1_3_2_1_9_1","first-page":"225","volume-title":"Linux Symposium","author":"Kivity A.","year":"2007"},{"key":"e_1_3_2_1_10_1","volume-title":"Carnegie Mellon University","author":"Klemperer P. F.","year":"2015"},{"key":"e_1_3_2_1_11_1","volume-title":"Wiley","author":"Ligh M. H.","year":"2014"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273031"},{"key":"e_1_3_2_1_13_1","unstructured":"M. Narouei. Mining modules dependencies for malware detection. www.kaspersky.com\/downloads\/pdf\/masoud_narouei.pdf 2012.  M. Narouei. Mining modules dependencies for malware detection. www.kaspersky.com\/downloads\/pdf\/masoud_narouei.pdf 2012."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium","author":"Petroni N. L.","year":"2004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522972"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774303"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Srivastava\n     and \n      \n      \n      J.\n       \n      Giffin\n      \n  \n  . \n  Automatic discovery of parasitic malware. In S. Jha R. Sommer and C. Kreibich editors Recent Advances in Intrusion Detection volume \n  6307\n   of \n  Lecture Notes in Computer Science pages \n  97\n  --\n  117\n  . \n  2010\n  .   A. Srivastava and J. Giffin. Automatic discovery of parasitic malware. In S. Jha R. Sommer and C. Kreibich editors Recent Advances in Intrusion Detection volume 6307 of Lecture Notes in Computer Science pages 97--117. 2010.","DOI":"10.1007\/978-3-642-15512-3_6"},{"key":"e_1_3_2_1_20_1","unstructured":"B. Walters. Vmware virtual platform. Linux J. (63es) 1999.   B. Walters. Vmware virtual platform. Linux J. (63es) 1999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016777"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_23_1","volume-title":"International Workshop on Security and Privacy in Cloud computing (SPCC), in conjunction with IEEE CNS","author":"Xie X.","year":"2013"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266852"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Yin H.","year":"2008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.37"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","location":"Xi'an China","acronym":"ASIA CCS '16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM International Workshop on Security in Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898445.2898456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898445.2898456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:30Z","timestamp":1750222590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898445.2898456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":27,"alternative-id":["10.1145\/2898445.2898456","10.1145\/2898445"],"URL":"https:\/\/doi.org\/10.1145\/2898445.2898456","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}