{"id":"https://openalex.org/W4281286993","doi":"https://doi.org/10.1109/cscwd54268.2022.9776255","title":"Detection of Hardware-Assisted Virtualization Based on Low-Level Feature","display_name":"Detection of Hardware-Assisted Virtualization Based on Low-Level Feature","publication_year":2022,"publication_date":"2022-05-04","ids":{"openalex":"https://openalex.org/W4281286993","doi":"https://doi.org/10.1109/cscwd54268.2022.9776255"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd54268.2022.9776255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd54268.2022.9776255","pdf_url":null,"source":{"id":"https://openalex.org/S4363607909","display_name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113699811","display_name":"Xiaojie Tao","orcid":"https://orcid.org/0009-0007-6054-4295"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaojie Tao","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328729","display_name":"Liming Wang","orcid":"https://orcid.org/0000-0002-5732-5258"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Wang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100307874","display_name":"Zhen Xu","orcid":"https://orcid.org/0000-0001-8855-0565"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112928052","display_name":"Ru Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Xie","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113699811"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1039,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.24488257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"55","issue":null,"first_page":"914","last_page":"919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.899978756904602},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.8426666259765625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8061544895172119},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.7918089628219604},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.77275550365448},{"id":"https://openalex.org/keywords/application-virtualization","display_name":"Application virtualization","score":0.6609246730804443},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5763575434684753},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5398248434066772},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5319421887397766},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5047334432601929},{"id":"https://openalex.org/keywords/storage-virtualization","display_name":"Storage virtualization","score":0.4574098587036133},{"id":"https://openalex.org/keywords/service-virtualization","display_name":"Service virtualization","score":0.45218461751937866}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.899978756904602},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.8426666259765625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8061544895172119},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.7918089628219604},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.77275550365448},{"id":"https://openalex.org/C13062989","wikidata":"https://www.wikidata.org/wiki/Q651531","display_name":"Application virtualization","level":5,"score":0.6609246730804443},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5763575434684753},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5398248434066772},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5319421887397766},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5047334432601929},{"id":"https://openalex.org/C34760210","wikidata":"https://www.wikidata.org/wiki/Q2308665","display_name":"Storage virtualization","level":4,"score":0.4574098587036133},{"id":"https://openalex.org/C22502294","wikidata":"https://www.wikidata.org/wiki/Q17149844","display_name":"Service virtualization","level":5,"score":0.45218461751937866}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd54268.2022.9776255","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd54268.2022.9776255","pdf_url":null,"source":{"id":"https://openalex.org/S4363607909","display_name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W23711711","https://openalex.org/W1488058190","https://openalex.org/W1503814339","https://openalex.org/W1934458198","https://openalex.org/W1992291252","https://openalex.org/W2066220442","https://openalex.org/W2121398530","https://openalex.org/W2140807364","https://openalex.org/W2496872468","https://openalex.org/W2787617994","https://openalex.org/W3036246938","https://openalex.org/W6601006388","https://openalex.org/W6678079094"],"related_works":["https://openalex.org/W2021257679","https://openalex.org/W2134071009","https://openalex.org/W190436017","https://openalex.org/W633976324","https://openalex.org/W759120778","https://openalex.org/W137788609","https://openalex.org/W2106040863","https://openalex.org/W2189348126","https://openalex.org/W2352195790","https://openalex.org/W2062047400"],"abstract_inverted_index":{"Hardware-assisted":[0],"virtualization":[1,19,79,106],"is":[2,39,70,80,108],"widely":[3],"adopted":[4],"in":[5,42,71,99,141,156,165,187],"cloud":[6,191],"computing":[7],"and":[8,15,28,34,143,158,167,190],"desktop":[9],"platforms,":[10],"significantly":[11],"enhancing":[12],"the":[13,48,86,130,174,177,203],"security":[14],"efficiency":[16],"of":[17,78,176,205],"full":[18],"systems":[20,26],"by":[21],"dividing":[22],"multiple":[23],"guest":[24,32,44,87,91],"operating":[25],"(OSes)":[27],"providing":[29],"isolation":[30],"between":[31],"OSes":[33],"host":[35,49],"OS.":[36],"Thus,":[37],"malware":[38,57],"usually":[40],"analyzed":[41],"a":[43,62,72,90,100],"OS":[45,50],"to":[46,81,85,119,148],"prevent":[47],"from":[51],"being":[52],"compromised.":[53],"However,":[54],"an":[55],"advanced":[56],"will":[58],"deliberately":[59],"masquerade":[60],"as":[61],"benign":[63],"program":[64],"when":[65],"it":[66,69,97],"detects":[67],"that":[68,96,115,197],"virtualized":[73,101,144,159,168],"environment.":[74,102],"The":[75,134,162,193],"ideal":[76],"goal":[77],"be":[82,94,117],"utterly":[83],"transparent":[84],"processes,":[88],"i.e.,":[89],"process":[92],"cannot":[93],"aware":[95],"runs":[98],"Nowadays,":[103],"although":[104],"hardware-assisted":[105,121,206],"detection":[107,124],"challenging,":[109],"we":[110],"present":[111],"three":[112],"novel":[113],"approaches":[114,125,199],"can":[116,200],"leveraged":[118],"detect":[120,202],"virtualization.":[122,207],"Our":[123],"are":[126,139],"mainly":[127],"based":[128],"on":[129,173],"following":[131],"features:":[132],"i)":[133],"available":[135],"CPU":[136,180],"instruction":[137],"sets":[138],"different":[140,154,171],"native":[142,157,166,189],"environments;":[145,160],"ii)":[146],"Modification":[147],"specific":[149],"control":[150],"register":[151],"flag":[152],"has":[153],"effects":[155,172],"iii)":[161],"physical":[163],"addresses":[164],"environments":[169],"have":[170,183],"eviction":[175],"level":[178],"2":[179],"cache.":[181],"We":[182],"conducted":[184],"intensive":[185],"experiments":[186],"both":[188],"environments.":[192],"experimental":[194],"results":[195],"show":[196],"our":[198],"effectively":[201],"existence":[204]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
