{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:00:47Z","timestamp":1770832847396,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176317","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"212-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Hyperagents"],"prefix":"10.1145","author":[{"given":"Micah","family":"Bushouse","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Douglas","family":"Reeves","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GRR Rapid Response. https:\/\/github.com\/google\/grr.  GRR Rapid Response. https:\/\/github.com\/google\/grr."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.39"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775111"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064829"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.012"},{"key":"e_1_3_2_1_8_1","first-page":"431","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Cristalli S.","year":"2016","unstructured":"S. Cristalli , M. Pagnozzi , M. Graziano , A. Lanzi , and D. Balzarotti . Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks . In 25th USENIX Security Symposium (USENIX Security 16) , pages 431 -- 446 , Austin, TX , 2016 . USENIX Association. S. Cristalli, M. Pagnozzi, M. Graziano, A. Lanzi, and D. Balzarotti. Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks. In 25th USENIX Security Symposium (USENIX Security 16), pages 431--446, Austin, TX, 2016. USENIX Association."},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Proceedings of the 23rd Conference on Large Installation System Administration, volume 10 of LISA'10","author":"Delaet T.","year":"2010","unstructured":"T. Delaet , W. Joosen , and B. Van Brabant . A Survey of System Configuration Tools . In Proceedings of the 23rd Conference on Large Installation System Administration, volume 10 of LISA'10 , pages 1 -- 8 , 2010 . T. Delaet, W. Joosen, and B. Van Brabant. A Survey of System Configuration Tools. In Proceedings of the 23rd Conference on Large Installation System Administration, volume 10 of LISA'10, pages 1--8, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516697"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"e_1_3_2_1_13_1","volume-title":"Leveraging Forensic Tools for Virtual Machine Introspection. Technical report","author":"Dolan-Gavitt B.","year":"2011","unstructured":"B. Dolan-Gavitt , B. Payne , and W. Lee . Leveraging Forensic Tools for Virtual Machine Introspection. Technical report , Georgia Institute of Technology , 2011 . B. Dolan-Gavitt, B. Payne, and W. Lee. Leveraging Forensic Tools for Virtual Machine Introspection. Technical report, Georgia Institute of Technology, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505124"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A Virtual Machine Introspection Based Architecture for Intrusion Detection . In Proceedings of the Network and Distributed Systems Security Symposium , 2003 . T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Proceedings of the Network and Distributed Systems Security Symposium, 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"HotOS","author":"Garfinkel T.","year":"2005","unstructured":"T. Garfinkel and M. Rosenblum . When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments . In HotOS , 2005 . T. Garfinkel and M. Rosenblum. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. In HotOS, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393551003657019"},{"key":"e_1_3_2_1_19_1","first-page":"309","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08","author":"Gupta D.","year":"2008","unstructured":"D. Gupta , S. Lee , M. Vrable , S. Savage , A. C. Snoeren , G. Varghese , G. M. Voelker , and A. Vahdat . Difference Engine: Harnessing Memory Redundancy in Virtual Machines . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08 , pages 309 -- 322 , Berkeley, CA, USA , 2008 . USENIX Association. D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference Engine: Harnessing Memory Redundancy in Virtual Machines. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI'08, pages 309--322, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.45"},{"key":"e_1_3_2_1_22_1","volume-title":"6th Layered Assurance Workshop","author":"Javaid S.","year":"2012","unstructured":"S. Javaid , A. Zoranic , I. Ahmed , and G. G. Richard III. Atomizer : Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment . In 6th Layered Assurance Workshop , 2012 . S. Javaid, A. Zoranic, I. Ahmed, and G. G. Richard III. Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment. In 6th Layered Assurance Workshop, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2014.33"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866314"},{"key":"e_1_3_2_1_26_1","volume-title":"Pitfalls of Virtual Machine Introspection on Modern Hardware. In 1st Workshop on Malware Memory Forensics (MMF)","author":"Lengyel T. K.","year":"2014","unstructured":"T. K. Lengyel , T. Kittel , G. Webster , J. Torrey , and C. Eckert . Pitfalls of Virtual Machine Introspection on Modern Hardware. In 1st Workshop on Malware Memory Forensics (MMF) , 2014 . T. K. Lengyel, T. Kittel, G. Webster, J. Torrey, and C. Eckert. Pitfalls of Virtual Machine Introspection on Modern Hardware. In 1st Workshop on Malware Memory Forensics (MMF), 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664252"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372336.2372343"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.194"},{"key":"e_1_3_2_1_30_1","volume-title":"The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory","author":"Ligh M.","year":"2014","unstructured":"M. Ligh , A. Case , J. Levy , and A. Walters . The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory . Wiley , 2014 . M. Ligh, A. Case, J. Levy, and A. Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Wiley, 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"Linux Kernel Development. Pearson Education","author":"Love R.","year":"2010","unstructured":"R. Love . Linux Kernel Development. Pearson Education , 2010 . R. Love. Linux Kernel Development. Pearson Education, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47238-6_14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_7"},{"key":"e_1_3_2_1_34_1","first-page":"297","volume-title":"Live and Trustworthy Forensic Analysis of Commodity Production Systems. In International Workshop on Recent Advances in Intrusion Detection (RAID)","author":"Martignoni L.","year":"2010","unstructured":"L. Martignoni , A. Fattori , R. Paleari , and L. Cavallaro . Live and Trustworthy Forensic Analysis of Commodity Production Systems. In International Workshop on Recent Advances in Intrusion Detection (RAID) , pages 297 -- 316 . Springer , 2010 . L. Martignoni, A. Fattori, R. Paleari, and L. Cavallaro. Live and Trustworthy Forensic Analysis of Commodity Production Systems. In International Workshop on Recent Advances in Intrusion Detection (RAID), pages 297--316. Springer, 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_36_1","volume-title":"Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. In 22nd European Symposium on Research in Computer Security. ESORICS","author":"Miyama S.","year":"2017","unstructured":"S. Miyama and K. Kourai . Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. In 22nd European Symposium on Research in Computer Security. ESORICS , 2017 . S. Miyama and K. Kourai. Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. In 22nd European Symposium on Research in Computer Security. ESORICS, 2017."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.10"},{"key":"e_1_3_2_1_38_1","volume-title":"Introducing Blue Pill. Invisible Things Laboratory","author":"Rutkowska J.","year":"2006","unstructured":"J. Rutkowska . Introducing Blue Pill. Invisible Things Laboratory , 2006 . J. Rutkowska. Introducing Blue Pill. Invisible Things Laboratory, 2006."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294294"},{"key":"e_1_3_2_1_40_1","first-page":"11","volume-title":"Proceedings of the 8th Conference on USENIX Security Symposium -","volume":"8","author":"Spencer R.","year":"1999","unstructured":"R. Spencer , S. Smalley , P. Loscocco , M. Hibler , D. Andersen , and J. Lepreau . The Flask Security Architecture: System Support for Diverse Security Policies . In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8 , SSYM'99, pages 11 -- 11 , Berkeley, CA, USA , 1999 . USENIX Association. R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM'99, pages 11--11, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592009"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0162"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"e_1_3_2_1_44_1","volume-title":"Algorithms and Architectures for Parallel Processing","author":"Wang C.","year":"2015","unstructured":"C. Wang , X. Yun , Z. Hao , L. Cui , Y. Han , and Q. Zou . Exploring Efficient and Robust Virtual Machine Introspection Techniques . In Algorithms and Architectures for Parallel Processing . Springer , 2015 . C. Wang, X. Yun, Z. Hao, L. Cui, Y. Han, and Q. Zou. Exploring Efficient and Robust Virtual Machine Introspection Techniques. In Algorithms and Architectures for Parallel Processing. Springer, 2015."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176317"}},"subtitle":["Migrating Host Agents to the Hypervisor"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":43,"alternative-id":["10.1145\/3176258.3176317","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176317","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}