{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:20Z","timestamp":1750306160330,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980309","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment"],"prefix":"10.1145","author":[{"given":"Bharati","family":"Ainapure","sequence":"first","affiliation":[{"name":"Dept. Of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India"}]},{"given":"Deven","family":"Shah","sequence":"additional","affiliation":[{"name":"Dept. of Information Technology, Thakur College of Engg. Kandivali, Mumbai, Maharashtra, India"}]},{"given":"A. Ananda","family":"Rao","sequence":"additional","affiliation":[{"name":"Dept. of Computer Sci. &amp; Engg, JNTUA, Anantapur, Andra Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431216"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655148.1655150"},{"key":"e_1_3_2_1_4_1","first-page":"191","volume-title":"Proc. Network and Distributed Systems Security Symp. The Internet Society.","author":"Garfinkel M.","unstructured":"T. Garfinkel and M. Rosenblum . 2003. A Virtual Machine Introspection-Based Architecture for Intrusion Detection . In Proc. Network and Distributed Systems Security Symp. The Internet Society. pp. 191 -- 206 . T. Garfinkel and M. Rosenblum. 2003. A Virtual Machine Introspection-Based Architecture for Intrusion Detection. In Proc. Network and Distributed Systems Security Symp. The Internet Society. pp. 191--206."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653729"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368517"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/15567280802047135"},{"key":"e_1_3_2_1_8_1","unstructured":"B. Dolan-Gavitt B. Payne and W. Lee. 2011. Leveraging forensic tools for virtual machine introspection. Technical Report. GT-CS-11-05.  B. Dolan-Gavitt B. Payne and W. Lee. 2011. Leveraging forensic tools for virtual machine introspection. Technical Report. GT-CS-11-05."},{"key":"e_1_3_2_1_9_1","first-page":"133","volume-title":"Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HOTOS '01)","author":"Chen B. D.","unstructured":"P. M. Chen , and B. D. Noble . 2001. When virtual is better than real , in Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HOTOS '01) . Washington, DC, USA: IEEE Computer Society. p. 133 . P. M. Chen, and B. D. Noble. 2001. When virtual is better than real, in Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HOTOS '01). Washington, DC, USA: IEEE Computer Society. p. 133."},{"key":"e_1_3_2_1_10_1","volume-title":"Simplifying Virtual Machine Introspection Using LibVMI. Sandia National Laboratories No. SAND 2012-7818","author":"Bryan D.","year":"2012","unstructured":"Bryan D. Payne . 2012 . Simplifying Virtual Machine Introspection Using LibVMI. Sandia National Laboratories No. SAND 2012-7818 . Bryan D. Payne. 2012. Simplifying Virtual Machine Introspection Using LibVMI. Sandia National Laboratories No. SAND 2012-7818."},{"key":"e_1_3_2_1_11_1","unstructured":"LibVMI. Online available. http:\/\/www.libvmi.com.  LibVMI. Online available. http:\/\/www.libvmi.com."},{"key":"e_1_3_2_1_12_1","first-page":"96","volume-title":"Nitro: Hardware-based System Call Tracing for Virtual Machines 6th International Workshop on Security IWSEC.","author":"Pfoh C.","unstructured":"J. Pfoh , C. Schneider , and C. Eckert . 2011 . Nitro: Hardware-based System Call Tracing for Virtual Machines 6th International Workshop on Security IWSEC. pp. 96 -- 112 . J. Pfoh, C. Schneider, and C. Eckert. 2011. Nitro: Hardware-based System Call Tracing for Virtual Machines 6th International Workshop on Security IWSEC. pp. 96--112."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.35"},{"key":"e_1_3_2_1_14_1","unstructured":"InSight project website. https:\/\/code.google.com\/p\/insight-vmi\/.  InSight project website. https:\/\/code.google.com\/p\/insight-vmi\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","acronym":"ICIA-16","location":"Pondicherry India"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":15,"alternative-id":["10.1145\/2980258.2980309","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980309","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}