{"id":"https://openalex.org/W2035290250","doi":"https://doi.org/10.1109/tcc.2014.2338305","title":"Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting","display_name":"Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting","publication_year":2014,"publication_date":"2014-07-11","ids":{"openalex":"https://openalex.org/W2035290250","doi":"https://doi.org/10.1109/tcc.2014.2338305","mag":"2035290250"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2014.2338305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2014.2338305","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://escholarship.org/content/qt9sm8v3zh/qt9sm8v3zh.pdf?t=q4kc3i","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025848422","display_name":"Yufei Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yufei Gu","raw_affiliation_strings":["Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059583347","display_name":"Yangchun Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yangchun Fu","raw_affiliation_strings":["Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110290219","display_name":"Aravind Prakash","orcid":"https://orcid.org/0000-0002-2994-0480"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aravind Prakash","raw_affiliation_strings":["Department of Computer Science Syracuse University, 400 Ostrom Avenue, Syracuse, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Syracuse University, 400 Ostrom Avenue, Syracuse, NY","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026864098","display_name":"Zhiqiang Lin","orcid":"https://orcid.org/0000-0001-6527-5994"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Lin","raw_affiliation_strings":["Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Texas at Dallas, 800 W. Campbell RD, Richardson, TX","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073376805","display_name":"Heng Yin","orcid":"https://orcid.org/0000-0002-8942-7742"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Heng Yin","raw_affiliation_strings":["Department of Computer Science Syracuse University, 400 Ostrom Avenue, Syracuse, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Syracuse University, 400 Ostrom Avenue, Syracuse, NY","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025848422"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":3.7981,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93762448,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":"4","first_page":"380","last_page":"394"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7677075862884521},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6809165477752686},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5446473956108093},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5100222229957581},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4902415871620178},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4564095437526703},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.45584386587142944},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.44336459040641785},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33265647292137146},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3302794098854065},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.28180885314941406},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17914679646492004},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1332123577594757},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09561532735824585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7677075862884521},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6809165477752686},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5446473956108093},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5100222229957581},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4902415871620178},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4564095437526703},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.45584386587142944},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.44336459040641785},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33265647292137146},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3302794098854065},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28180885314941406},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17914679646492004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1332123577594757},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09561532735824585},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcc.2014.2338305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2014.2338305","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:escholarship.org:ark:/13030/qt9sm8v3zh","is_oa":true,"landing_page_url":"https://escholarship.org/uc/item/9sm8v3zh","pdf_url":"https://escholarship.org/content/qt9sm8v3zh/qt9sm8v3zh.pdf?t=q4kc3i","source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Cloud Computing, vol 2, iss 4","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:escholarship.org:ark:/13030/qt9sm8v3zh","is_oa":true,"landing_page_url":"https://escholarship.org/uc/item/9sm8v3zh","pdf_url":"https://escholarship.org/content/qt9sm8v3zh/qt9sm8v3zh.pdf?t=q4kc3i","source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Cloud Computing, vol 2, iss 4","raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2035290250.pdf","grobid_xml":"https://content.openalex.org/works/W2035290250.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W153190198","https://openalex.org/W1486443221","https://openalex.org/W1545927878","https://openalex.org/W1564075167","https://openalex.org/W1593678010","https://openalex.org/W1641762327","https://openalex.org/W1813040609","https://openalex.org/W1985108724","https://openalex.org/W2021920901","https://openalex.org/W2029224396","https://openalex.org/W2043501224","https://openalex.org/W2097015782","https://openalex.org/W2101080231","https://openalex.org/W2101889913","https://openalex.org/W2102039064","https://openalex.org/W2106847544","https://openalex.org/W2108860402","https://openalex.org/W2112731379","https://openalex.org/W2117991511","https://openalex.org/W2121619222","https://openalex.org/W2128159601","https://openalex.org/W2135162105","https://openalex.org/W2150709728","https://openalex.org/W2159265516","https://openalex.org/W2167356302","https://openalex.org/W2168468057","https://openalex.org/W2328374358","https://openalex.org/W2399247437","https://openalex.org/W4247984266","https://openalex.org/W4285719527","https://openalex.org/W6606233576","https://openalex.org/W6629032807","https://openalex.org/W6633665954","https://openalex.org/W6635629245","https://openalex.org/W6637110787","https://openalex.org/W6675159262","https://openalex.org/W6676006331","https://openalex.org/W6676844517","https://openalex.org/W6712290283"],"related_works":["https://openalex.org/W1671124163","https://openalex.org/W2168674042","https://openalex.org/W2339806289","https://openalex.org/W3008853525","https://openalex.org/W3030774134","https://openalex.org/W2159024673","https://openalex.org/W2104499293","https://openalex.org/W3001987467","https://openalex.org/W4252190074","https://openalex.org/W2968165261"],"abstract_inverted_index":{"Precise":[0],"fingerprinting":[1,38,90],"of":[2,60,103,165],"an":[3],"operating":[4],"system":[5],"(OS)":[6],"is":[7,177],"critical":[8],"to":[9,122,149],"many":[10],"security":[11],"and":[12,32,47,54,86,159,186,195],"forensics":[13],"applications":[14],"in":[15,52,65,69,91],"the":[16,57,92,124,151,173,183,191],"cloud,":[17],"such":[18],"as":[19,96],"virtual":[20],"machine":[21],"(VM)":[22],"introspection,":[23],"penetration":[24],"testing,":[25],"guest":[26,88,105,125],"OS":[27,37,89,126],"administration,":[28],"kernel":[29,119,140,146],"dump":[30,102],"analysis,":[31],"memory":[33,59,81,101],"forensics.":[34],"The":[35],"existing":[36],"techniques":[39],"primarily":[40],"inspect":[41],"network":[42],"packets":[43],"or":[44],"CPU":[45],"states,":[46],"they":[48],"all":[49,66],"fall":[50],"short":[51],"precision":[53],"usability.":[55],"As":[56],"physical":[58,100],"a":[61,79,99,104,113,139,156,163],"VM":[62],"always":[63],"exists":[64],"these":[67],"applications,":[68],"this":[70],"article,":[71],"we":[72],"present":[73],"OS-SOMMELIER":[74,107,133],"<sup":[75,108,134],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[76,109,135],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">+</sup>":[77,110,136],",":[78],"multi-aspect,":[80],"exclusive":[82],"approach":[83,117,131,144,176,189,194],"for":[84],"precise":[85],"robust":[87],"cloud.":[93],"It":[94],"works":[95],"follows:":[97],"given":[98],"OS,":[106],"first":[111],"uses":[112,138],"code":[114,120,129,174,192],"hash":[115,130,175],"based":[116,143],"from":[118,145],"aspect":[121,148],"determine":[123,150],"version.":[127,152],"If":[128],"fails,":[132],"then":[137],"data":[141,147,187],"signature":[142,188,193],"We":[153],"have":[154],"implemented":[155],"prototype":[157],"system,":[158],"tested":[160],"it":[161],"with":[162],"number":[164],"Linux":[166],"kernels.":[167,200],"Our":[168],"evaluation":[169],"results":[170],"show":[171],"that":[172],"faster":[178],"but":[179],"can":[180,196],"only":[181],"fingerprint":[182,197],"known":[184],"kernels,":[185],"complements":[190],"even":[198],"unknown":[199]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
