{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T19:02:27Z","timestamp":1759777347582,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1441724"],"award-info":[{"award-number":["1441724"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176325","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"236-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure, Consistent, and High-Performance Memory Snapshotting"],"prefix":"10.1145","author":[{"given":"Guilherme","family":"Cox","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Zi","family":"Yan","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Abhishek","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750386"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750385"},{"key":"e_1_3_2_1_3_1","unstructured":"William Arbaugh. {n. d.}. Komoku https:\/\/www.cs.umd.edu\/ waa\/UMD\/Home.html.  William Arbaugh. {n. d.}. Komoku https:\/\/www.cs.umd.edu\/ waa\/UMD\/Home.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.38"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"volume-title":"3D execution monitor (3D-EM): Using 3D circuits to detect hardware malicious inclusions in general purpose processors 6th International Conference on Information Warfare and Security","author":"Bilzor M.","key":"e_1_3_2_1_7_1","unstructured":"M. Bilzor . 2011. 3D execution monitor (3D-EM): Using 3D circuits to detect hardware malicious inclusions in general purpose processors 6th International Conference on Information Warfare and Security . M. Bilzor. 2011. 3D execution monitor (3D-EM): Using 3D circuits to detect hardware malicious inclusions in general purpose processors 6th International Conference on Information Warfare and Security."},{"key":"e_1_3_2_1_8_1","volume-title":"Security Checkers: Detecting Processor Malicious Inclusions at Runtime IEEE International Symposium on Hardware-oriented Security and Trust.","author":"Bilzor M.","year":"2011","unstructured":"M. Bilzor , T. Huffmire , C. Irvine , and T. Levin . 2011 . Security Checkers: Detecting Processor Malicious Inclusions at Runtime IEEE International Symposium on Hardware-oriented Security and Trust. M. Bilzor, T. Huffmire, C. Irvine, and T. Levin. 2011. Security Checkers: Detecting Processor Malicious Inclusions at Runtime IEEE International Symposium on Hardware-oriented Security and Trust."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. Bilzor T. Huffmire C. Irvine and T. Levin. 2012. Evaluating Security Requirements in a General-purpose Processor by Combining Assertion Checkers with Code Coverage IEEE International Symposium on Hardware-oriented Security and Trust.  M. Bilzor T. Huffmire C. Irvine and T. Levin. 2012. Evaluating Security Requirements in a General-purpose Processor by Combining Assertion Checkers with Code Coverage IEEE International Symposium on Hardware-oriented Security and Trust.","DOI":"10.1109\/HST.2012.6224318"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.18"},{"volume-title":"Remote Repair of Operating System State Using Backdoors International Conference on Autonomic Computing (ICAC).","author":"Bohra A.","key":"e_1_3_2_1_11_1","unstructured":"A. Bohra , I. Neamtiu , P. Gallard , F. Sultan , and L. Iftode . 2004 . Remote Repair of Operating System State Using Backdoors International Conference on Autonomic Computing (ICAC). A. Bohra, I. Neamtiu, P. Gallard, F. Sultan, and L. Iftode. 2004. Remote Repair of Operating System State Using Backdoors International Conference on Autonomic Computing (ICAC)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653729"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.12.004"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176325","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":13,"alternative-id":["10.1145\/3176258.3176325","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176325","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}