{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T01:31:05Z","timestamp":1763429465903,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13677-017-0098-8","type":"journal-article","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T12:06:16Z","timestamp":1512734776000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Classifying malware attacks in IaaS cloud environments"],"prefix":"10.1186","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7594-6349","authenticated-orcid":false,"given":"No\u00eblle","family":"Rakotondravony","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Taubmann","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Mandarawi","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Weish\u00e4upl","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Bojan","family":"Kolosnjaji","sequence":"additional","affiliation":[]},{"given":"Mykolai","family":"Protsenko","sequence":"additional","affiliation":[]},{"given":"Hermann","family":"de Meer","sequence":"additional","affiliation":[]},{"given":"Hans P.","family":"Reiser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"98_CR1","unstructured":"Statista (2016) Global public cloud infrastructure hardware\/software spending 2015-2026, by segment (fee based). Online at http:\/\/www.statista.com\/statistics\/507952\/worldwide-public-cloud-infrastructure-hardware-and-software-spending-by-segment\/. Accessed 1 Dec 2017."},{"key":"98_CR2","unstructured":"AV-Test Institute (2016) Statistics \u2013 new malware. Online at https:\/\/www.av-test.org\/en\/statistics\/malware\/. Accessed 1 Dec 2017."},{"issue":"1","key":"98_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume K, Rosado DG, Fern\u00e1ndez-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):1\u201313.","journal-title":"J Internet Serv Appl"},{"key":"98_CR4","first-page":"191","volume-title":"Proceedings Network and Distributed Systems Security Symposium","author":"T Garfinkel","year":"2003","unstructured":"Garfinkel T, Rosenblum M (2003) A Virtual Machine Introspection Based Architecture for Intrusion Detection In: Proceedings Network and Distributed Systems Security Symposium, 191\u2013206.. The Internet Society, Reston."},{"key":"98_CR5","volume-title":"International Conference on Trust, Security and Privacy in Computing and Communications, 2016. 15th Annual","author":"B Taubmann","year":"2016","unstructured":"Taubmann B, Rakotondravony N, Reiser HP (2016) Cloudphylactor: Harnessing mandatory access control for virtual machine introspection in cloud data centers In: International Conference on Trust, Security and Privacy in Computing and Communications, 2016. 15th Annual.. IEEE Computer Security, Los Alamitos."},{"key":"98_CR6","unstructured":"Top Threats Working Group (2013) The notorious nine: cloud computing top threats in 2013. Cloud Secur Alliance. Online at https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/top_threats\/The_Notorious_Nine_Cloud_Computing_Top_ Threats_in_2013.pdf. Accessed 1 Dec 2017."},{"issue":"2","key":"98_CR7","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"Z Xiao","year":"2013","unstructured":"Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutor 15(2):843\u2013859.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"98_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1\u201311.","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"98_CR9","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes DA, Soares LF, Gomes JV, Freire MM, In\u00e1cio PR (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113\u2013170.","journal-title":"Int J Inf Secur"},{"issue":"4","key":"98_CR10","doi-asserted-by":"crossref","first-page":"1:68","DOI":"10.1145\/2767181","volume":"47","author":"W Huang","year":"2015","unstructured":"Huang W, Ganjali A, Kim BH, Oh S, Lie D (2015) The state of public infrastructure-as-a-service cloud security. ACM Comput Surv (CSUR) 47(4):1:68\u201368:31.","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2","key":"98_CR11","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561\u2013592.","journal-title":"J Supercomput"},{"issue":"1","key":"98_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/computers3010001","volume":"3","author":"IM Khalil","year":"2014","unstructured":"Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: A survey. Computers 3(1):1\u201335.","journal-title":"Computers"},{"issue":"1","key":"98_CR13","doi-asserted-by":"crossref","first-page":"2:1","DOI":"10.1145\/2767005","volume":"48","author":"CA Ardagna","year":"2015","unstructured":"Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: A survey. ACM Comput Surv 48(1):2:1\u20132:50.","journal-title":"ACM Comput Surv"},{"key":"98_CR14","first-page":"153","volume-title":"2014 IEEE International Conference on Cloud Engineering","author":"A Srivastava","year":"2014","unstructured":"Baek Hw, Srivastava A, Merwe JVd (2014) Cloudvmi: Virtual machine introspection as a cloud service In: 2014 IEEE International Conference on Cloud Engineering, 153\u2013158.. IEEE Computer Society, Washington."},{"key":"98_CR15","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-319-19129-4_17","volume-title":"IFIP International Conference on Distributed Applications and Interoperable Systems","author":"J Zach","year":"2015","unstructured":"Zach J, Reiser HP (2015) Livecloudinspector: Towards integrated IaaS forensics in the cloud In: IFIP International Conference on Distributed Applications and Interoperable Systems, 207\u2013220.. Springer, New York."},{"key":"98_CR16","unstructured":"Wueest C, Barcena MB, O\u2019Brien L (2015) White paper: Mistakes in the IaaS cloud could put your data at risk. Technical report, Symantec."},{"key":"98_CR17","volume-title":"NDSS2016. Citeseer","author":"HD Jianjun Chen","year":"2016","unstructured":"Jianjun Chen HD, Zheng X, Liang J, Jiang J, Li K, Wan T, Paxson V (2016) Forwarding loop attacks in content delivery networks (CDN) In: NDSS2016. Citeseer.. The Internet Society, Reston."},{"key":"98_CR18","unstructured":"Top Threats Working Group (2016) The Treacherous 12: Cloud Computing Top Threats in 2016. Cloud Security Alliance. online at https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/topthreats\/Treacherous12_CloudComputing_TopThreats.pdf. Accessed 1 Dec 2017."},{"key":"98_CR19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2046660.2046664","volume-title":"Proceedings of the 3rd ACM workshop on Cloud computing security workshop","author":"J Somorovsky","year":"2011","unstructured":"Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L (2011) All your clouds are belong to us: security analysis of cloud management interfaces In: Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3\u201314.. ACM, New York."},{"key":"98_CR20","volume-title":"RSA Conference","author":"DM Cappelli","year":"2009","unstructured":"Cappelli DM, Trzeciak RF (2009) Best practices for mitigating insider threat: Lessons learned from 250 cases In: RSA Conference.. Springer, New York."},{"key":"98_CR21","unstructured":"Luna J, Ghani H, Vateva T, Suri N (2012) Quantitative assessment of cloud security level agreements: A case study In: Proc. of Security and Cryptography, 64\u201373."},{"key":"98_CR22","unstructured":"Al Morsy M, Grundy J, M\u00fcller I (2010) An analysis of the cloud computing security problem In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov, x."},{"key":"98_CR23","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1145\/2976749.2978349","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"X Liao","year":"2016","unstructured":"Liao X, Alrwais S, Yuan K, Xing L, Wang X, Hao S, Beyah R (2016) Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1541\u20131552.. ACM, New York."},{"key":"98_CR24","first-page":"199","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909","author":"T Ristenpart","year":"2009","unstructured":"Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909, 199\u2013212.. ACM, New York."},{"key":"98_CR25","doi-asserted-by":"crossref","unstructured":"Inci MS, Gulmezoglu B, Eisenbarth T, Sunar B (2016) Co-location detection on the cloud Cryptology ePrint Archive, Report 2016\/284.","DOI":"10.1007\/978-3-319-43283-0_2"},{"key":"98_CR26","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/DASC.2011.110","volume-title":"Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on","author":"H Hlavacs","year":"2011","unstructured":"Hlavacs H, Treutner T, Gelas J-P, Lefevre L, Orgerie A-C (2011) Energy consumption side-channel attack at virtual machines in a cloud In: Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 605\u2013612.. IEEE Computer Society, Washington."},{"key":"98_CR27","first-page":"687","volume-title":"Advanced Applied Informatics (IIAIAAI), 2014 IIAI 3rd International Conference on","author":"N Bin Sulaiman","year":"2014","unstructured":"Bin Sulaiman N, Masuda H (2014) Evaluation of a secure live migration of virtual machines using ipsec implementation In: Advanced Applied Informatics (IIAIAAI), 2014 IIAI 3rd International Conference on, 687\u2013693.. IEEE Computer Society, Los Alamitos."},{"key":"98_CR28","first-page":"160","volume-title":"Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on","author":"M Aiash","year":"2014","unstructured":"Aiash M, Mapp G, Gemikonakli O (2014) Secure live virtual machines migration: Issues and solutions In: Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on, 160\u2013165.. IEEE Computer Society, Los Alamitos."},{"key":"98_CR29","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/ICACCI.2013.6637178","volume-title":"Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on","author":"M Anala","year":"2013","unstructured":"Anala M, Shetty J, Shobha G (2013) A framework for secure live migration of virtual machines In: Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on, 243\u2013248.. IEEE, Piscataway."},{"key":"98_CR30","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/DSNW.2011.5958798","volume-title":"2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)","author":"F Rocha","year":"2011","unstructured":"Rocha F, Correia M (2011) Lucy in the sky without diamonds: Stealing confidential data in the cloud In: 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), 129\u2013134.. IEEE, Los Alamitos."},{"key":"98_CR31","first-page":"9","volume":"1","author":"N Santos","year":"2009","unstructured":"Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. HotCloud 1:9.","journal-title":"HotCloud"},{"key":"98_CR32","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/SP.2014.45","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"B Jain","year":"2014","unstructured":"Jain B, Baig MB, Zhang D, Porter DE, Sion R (2014) SoK: Introspections on trust and the semantic gap In: 2014 IEEE Symposium on Security and Privacy, 605\u2013620.. IEEE Computer Society, Los Alamitos."},{"issue":"1","key":"98_CR33","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MSP.2008.24","volume":"6","author":"M Carbone","year":"2008","unstructured":"Carbone M, Zamboni D, Lee W (2008) Taming virtualization. IEEE Secur Priv 6(1):65\u201367.","journal-title":"IEEE Secur Priv"},{"key":"98_CR34","unstructured":"Ormandy TAn Empirical Study into the Security Exposure to Hosts of Hostile Virtualized. Online at http:\/\/taviso.decsystem.org\/virtsec.pdf. Accessed 1 Dec 2017."},{"key":"98_CR35","volume-title":"HotOS","author":"T Garfinkel","year":"2005","unstructured":"Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments In: HotOS.. USENIX Association, Berkeley."},{"key":"98_CR36","volume-title":"Proc. of BlackHat DC convention","author":"J Oberheide","year":"2008","unstructured":"Oberheide J, Cooke E, Jahanian F (2008) Empirical exploitation of live virtual machine migration In: Proc. of BlackHat DC convention.. The Pennsylvania State University, Citeseer."},{"key":"98_CR37","unstructured":"Zhang S (2013) Deep-diving into an easily-overlooked threat: Inter-vm attacks Whitepaper, provided by Kansas State University, TechRepublic\/US2012."},{"key":"98_CR38","first-page":"18","volume-title":"Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on","author":"H Wu","year":"2010","unstructured":"Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing In: Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, 18\u201321.. IEEE, Los Alamitos."},{"key":"98_CR39","unstructured":"Inci MS, Gulmezoglu B, Irazoqui G, Eisenbarth T, Sunar B (2015) Seriously, get off my cloud! cross-VM RSA key recovery in a public cloud. Technical report,IACR Cryptology ePrint Archive."},{"issue":"4","key":"98_CR40","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1145\/265924.265930","volume":"15","author":"E Bugnion","year":"1997","unstructured":"Bugnion E, Devine S, Govil K, Rosenblum M (1997) Disco: Running commodity operating systems on scalable multiprocessors. ACM Trans Comput Syst 15(4):412\u2013447.","journal-title":"ACM Trans Comput Syst"},{"key":"98_CR41","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-319-21476-4_8","volume-title":"Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, COSADE","author":"B G\u00fclmezo\u011flu","year":"2015","unstructured":"G\u00fclmezo\u011flu B, \u0130nci MS, Irazoqui G, Eisenbarth T, Sunar B (2015) A faster and more realistic flush+reload attack on AES In: Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, COSADE, 111\u2013126.. Springer, New York."},{"key":"98_CR42","first-page":"92","volume-title":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","author":"JR Yeh","year":"2016","unstructured":"Yeh JR, Hsiao HC, Pang AC (2016) Migrant attack: A multi-resource dos attack on cloud virtual machine migration schemes In: 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 92\u201399.. IEEE Computer Society, Los Alamitos."},{"key":"98_CR43","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2484402.2484406","volume-title":"Proceedings of the 2013 international workshop on Security in cloud computing","author":"D Perez-Botero","year":"2013","unstructured":"Perez-Botero D, Szefer J, Lee RB (2013) Characterizing hypervisor vulnerabilities in cloud computing servers In: Proceedings of the 2013 international workshop on Security in cloud computing, 3\u201310.. ACM, New York."},{"key":"98_CR44","doi-asserted-by":"crossref","unstructured":"Amit N, Tsafrir D, Schuster A, Ayoub A, Shlomo E (2015) Virtual CPU validation. In: Proceedings of the 25th Symposium on Operating Systems Principles, SOSP \u201915:311\u2013327.","DOI":"10.1145\/2815400.2815420"},{"key":"98_CR45","doi-asserted-by":"crossref","unstructured":"Elhage NVirtunoid: A KVM Guest \u2192 Host privilege escalation exploit. Black Hat USA. Online at http:\/\/www.hakim.ws\/BHUS2011\/materials\/Elhage\/BH_US_11_Elhage_Virtunoid_WP.pdf . Accessed 1 Dec 2017.","DOI":"10.1007\/978-3-319-64704-3_2"},{"key":"98_CR46","volume-title":"Poster Reception at the 2013 Annual Computer Security Applications Conference (ACSAC 2013)","author":"A Milenkoski","year":"2013","unstructured":"Milenkoski A, Payne BD, Antunes N, Vieira M, Kounev S (2013) HInjector: injecting hypercall attacks for evaluating VMI-based intrusion detection systems In: Poster Reception at the 2013 Annual Computer Security Applications Conference (ACSAC 2013).. ACM, New York."},{"key":"98_CR47","first-page":"56","volume-title":"8th Annual Symposium on Information Assurance (ASIA\u201913)","author":"G Booth","year":"2013","unstructured":"Booth G, Soknacki A, Somayaji A (2013) Cloud security: Attacks and current defenses In: 8th Annual Symposium on Information Assurance (ASIA\u201913), 56\u201362.. NYSCSC, New York."},{"issue":"4","key":"98_CR48","doi-asserted-by":"crossref","first-page":"533","DOI":"10.3233\/JCS-130474","volume":"21","author":"F Zhou","year":"2013","unstructured":"Zhou F, Goel M, Desnoyers P, Sundaram R (2013) Scheduler vulnerabilities and coordinated attacks in cloud computing. J Comput Secur 21(4):533\u2013559.","journal-title":"J Comput Secur"},{"key":"98_CR49","first-page":"82","volume-title":"29th IEEE Symposium on Reliable Distributed Systems","author":"S Bahram","year":"2010","unstructured":"Bahram S, Jiang X, Wang Z, Grace M, Li J, Srinivasan D, Rhee J, Xu D (2010) DKSM: subverting virtual machine introspection for fun and profit In: 29th IEEE Symposium on Reliable Distributed Systems, 82\u201391.. IEEE Computer Society, Los Alamitos."},{"key":"98_CR50","volume-title":"The Fifth International Conference on Emerging Security Information, Systems and Technologies","author":"K Vishnani","year":"2011","unstructured":"Vishnani K, Pais AR, Mohandas R (2011) Detecting & defeating split personality malware In: The Fifth International Conference on Emerging Security Information, Systems and Technologies.. IEEE Computer Security, Los Alamitos."},{"key":"98_CR51","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/SYNASC.2015.53","volume-title":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","author":"B-C Irimie","year":"2015","unstructured":"Irimie B-C, Petcu D (2015) Scalable and fault tolerant monitoring of security parameters in the cloud In: 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 289\u2013295.. IEEE, Los Alamitos."},{"key":"98_CR52","unstructured":"Kaspersky (2014) Global it security risks survey 2014 distributed denial of service (ddos) attacks. https:\/\/media.kaspersky.com\/en\/B2B-International-2014-Survey-DDoS-Summary-Report.pdf. Accessed 1 Dec 2017."},{"key":"98_CR53","first-page":"16","volume-title":"Proceedings of the International Conference on Grid Computing and Applications (GCA), The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)","author":"AS Bhingarkar","year":"2015","unstructured":"Bhingarkar AS, Shah BD (2015) A survey: Securing cloud infrastructure against EDoS attack In: Proceedings of the International Conference on Grid Computing and Applications (GCA), The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 16\u201322.. CSREA Press, Athens."},{"issue":"3","key":"98_CR54","first-page":"16:1","volume":"2","author":"MM Masud","year":"2011","unstructured":"Masud MM, Al-Khateeb TM, Hamlen KW, Gao J, Khan L, Han J, Thuraisingham B (2011) Cloud-based malware detection for evolving data streams. ACM Trans Manag Inf Syst (TMIS) 2(3):16:1\u201316:27.","journal-title":"ACM Trans Manag Inf Syst (TMIS)"},{"key":"98_CR55","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/2815675.2815707","volume-title":"Proceedings of the 2015 ACM Conference on Internet Measurement Conference","author":"R Miao","year":"2015","unstructured":"Miao R, Potharaju R, Yu M, Jain N (2015) The dark menace: Characterizing network-based attacks in the cloud In: Proceedings of the 2015 ACM Conference on Internet Measurement Conference, 169\u2013182.. ACM, New York."},{"key":"98_CR56","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1109\/BDCloud.2014.102","volume-title":"Big Data and Cloud Computing (BdCloud) 2014 IEEE Fourth International Conference on","author":"G Irazoqui","year":"2014","unstructured":"Irazoqui G, Inci M, Eisenbarth T, Sunar B (2014) Fine grain cross-vm attacks on xen and vmware In: Big Data and Cloud Computing (BdCloud) 2014 IEEE Fourth International Conference on, 737\u2013744.. IEEE Computer Society, Los Alamitos."},{"key":"98_CR57","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/2046660.2046671","volume-title":"Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW \u201911","author":"BC Vattikonda","year":"2011","unstructured":"Vattikonda BC, Das S, Shacham H (2011) Eliminating fine grained timers in xen In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW \u201911, 41\u201346.. ACM, New York."},{"key":"98_CR58","unstructured":"Wojtczuk RSubverting the Xen hypervisor. Black Hat USA. Online at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.167.5640&rep=rep1&type=pdf. Accessed 1 Dec 2017."},{"key":"98_CR59","unstructured":"Rutkowska J, Wojtczuk R (2008) Preventing and detecting Xen hypervisor subversions. Blackhat Brief USA. Online at http:\/\/invisiblethingslab.com\/resources\/bh08\/part2full.pdf. Accessed 1 Dec 2017."},{"key":"98_CR60","unstructured":"Rutkowska J, Tereshkin A (2008) Bluepilling the Xen hypervisor. Black Hat USA. Online at http:\/\/invisiblethingslab.com\/resources\/bh08\/part3.pdf. Accessed 1 Dec 2017."}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-017-0098-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:57:19Z","timestamp":1603501039000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-017-0098-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1186\/s13677-017-0098-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"type":"electronic","value":"2192-113X"}],"subject":[],"published":{"date-parts":[[2017,12]]},"article-number":"26"}}