{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:21Z","timestamp":1750220901546,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338511.3357346","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Winning Against any Adversary on Commodity Computer Systems"],"prefix":"10.1145","author":[{"given":"Virgil D.","family":"Gligor","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsbrgh, PA, APO AA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Protocols","author":"Virgil D.","year":"2010","unstructured":"Virgil D. Gligor , \"Security Limitations of Virtualization and How to Overcome Them,\" in B. Christianson and J. Malcolm (Eds.): Security Protocols 2010 , LNCS 7061, Springer , 2014. Virgil D. Gligor, \"Security Limitations of Virtualization and How to Overcome Them,\" in B. Christianson and J. Malcolm (Eds.): Security Protocols 2010, LNCS 7061, Springer, 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the NDSS","author":"Virgil D.","year":"2019","unstructured":"Virgil D. Gligor , Maverick Woo, \" Establishing Software Root of Trust Unconditionally,\" in Proc. of the NDSS , San Diego , Feb. , 2019 . Virgil D. Gligor, Maverick Woo, \"Establishing Software Root of Trust Unconditionally,\" in Proc. of the NDSS, San Diego, Feb., 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"Christianson et al. (Eds.): Security Protocols","author":"Virgil D.","year":"2014","unstructured":"Virgil D. Gligor , \"Dancing with the Adversary -- A Tale of Wimps and Giants,\" in B. Christianson et al. (Eds.): Security Protocols 2014 , LNCS 8809, Springer , 2014. Virgil D. Gligor, \"Dancing with the Adversary -- A Tale of Wimps and Giants,\" in B. Christianson et al. (Eds.): Security Protocols 2014, LNCS 8809, Springer, 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"Miao Yu Virgil Gligor and Limin Jia \"An I\/O Separation Model for Formal Verification of Kernel Designs \" 2019.  Miao Yu Virgil Gligor and Limin Jia \"An I\/O Separation Model for Formal Verification of Kernel Designs \" 2019."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338511.3357346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:46Z","timestamp":1750203886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":4,"alternative-id":["10.1145\/3338511.3357346","10.1145\/3338511"],"URL":"https:\/\/doi.org\/10.1145\/3338511.3357346","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}