{"id":"https://openalex.org/W2016915071","doi":"https://doi.org/10.1145/1229285.1229313","title":"A novel approach for a file-system integrity monitor tool of Xen virtual machine","display_name":"A novel approach for a file-system integrity monitor tool of Xen virtual machine","publication_year":2007,"publication_date":"2007-03-20","ids":{"openalex":"https://openalex.org/W2016915071","doi":"https://doi.org/10.1145/1229285.1229313","mag":"2016915071"},"language":"en","primary_location":{"id":"doi:10.1145/1229285.1229313","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034129709","display_name":"Nguyen Anh Quynh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210141715","display_name":"Keio University Shonan Fujisawa","ror":"https://ror.org/047khpn70","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210141715"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Nguyen Anh Quynh","raw_affiliation_strings":["Keio university, Fujisawa, Japan","Keio University, Fujisawa, JAPAN"],"affiliations":[{"raw_affiliation_string":"Keio university, Fujisawa, Japan","institution_ids":["https://openalex.org/I4210141715"]},{"raw_affiliation_string":"Keio University, Fujisawa, JAPAN","institution_ids":["https://openalex.org/I4210141715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050160318","display_name":"Yoshiyasu Takefuji","orcid":"https://orcid.org/0000-0002-1826-742X"},"institutions":[{"id":"https://openalex.org/I4210141715","display_name":"Keio University Shonan Fujisawa","ror":"https://ror.org/047khpn70","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210141715"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiyasu Takefuji","raw_affiliation_strings":["Keio university, Fujisawa, Japan","Keio University, Fujisawa, JAPAN"],"affiliations":[{"raw_affiliation_string":"Keio university, Fujisawa, Japan","institution_ids":["https://openalex.org/I4210141715"]},{"raw_affiliation_string":"Keio University, Fujisawa, JAPAN","institution_ids":["https://openalex.org/I4210141715"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034129709"],"corresponding_institution_ids":["https://openalex.org/I4210141715"],"apc_list":null,"apc_paid":null,"fwci":2.2461,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.88480848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"194","last_page":"202"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8417499661445618},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.6761274337768555},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.666662335395813},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.6167658567428589},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.607774555683136},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.5873348712921143},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.5560464859008789},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5397497415542603},{"id":"https://openalex.org/keywords/user-space","display_name":"User space","score":0.4982340335845947},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4474048912525177},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.42371857166290283},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3597787618637085},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35656851530075073},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2611343562602997},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2580558657646179}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8417499661445618},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.6761274337768555},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.666662335395813},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.6167658567428589},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.607774555683136},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.5873348712921143},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.5560464859008789},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5397497415542603},{"id":"https://openalex.org/C2775877400","wikidata":"https://www.wikidata.org/wiki/Q1142183","display_name":"User space","level":2,"score":0.4982340335845947},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4474048912525177},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.42371857166290283},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3597787618637085},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35656851530075073},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2611343562602997},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2580558657646179},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1229285.1229313","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1229285.1229313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1976146154","https://openalex.org/W2131726714","https://openalex.org/W2154081981","https://openalex.org/W2159238794","https://openalex.org/W4244704438"],"related_works":["https://openalex.org/W2354398839","https://openalex.org/W1979897749","https://openalex.org/W2297549974","https://openalex.org/W2171038386","https://openalex.org/W2371149587","https://openalex.org/W1969105756","https://openalex.org/W2119691727","https://openalex.org/W2488815249","https://openalex.org/W2773350783","https://openalex.org/W2157912940"],"abstract_inverted_index":{"File-system":[0],"integrity":[1],"tools":[2],"(FIT)":[3],"are":[4,19,82,204],"commonly":[5],"deployed":[6],"host-based":[7],"intrusion":[8,30,127],"detections":[9],"(HIDS)":[10],"tool":[11,113],"to":[12,69,96,137,163,182,189,237,241],"detect":[13],"unauthorized":[14],"file-system":[15],"changes.":[16],"While":[17],"FIT":[18,80],"widely":[20],"used,":[21],"this":[22],"kind":[23],"of":[24,67,101,111,154,245],"HIDS":[25],"has":[26,64],"many":[27],"drawbacks:":[28],"the":[29,41,46,52,58,71,76,79,85,98,102,141,145,155,172,190,195,201,219,223,243,246],"detection":[31,202],"is":[32,160,179,212,227,235],"not":[33,135,161],"done":[34],"in":[35,57,128,144,206,217],"real-time":[36,129],"manner,":[37,130],"which":[38],"might":[39],"render":[40],"whole":[42,224],"scheme":[43],"useless":[44],"if":[45,84,231],"attacker":[47,86,220],"can":[48,121],"somehow":[49],"take":[50],"over":[51,222],"system":[53],"with":[54,214],"privileged":[55,89],"access":[56],"time":[59],"between.":[60],"The":[61],"administrator":[62],"also":[63],"a":[65,93,107,112,176,207],"lot":[66],"problems":[68,100],"keep":[70],"base-line":[72],"database":[73,77,142],"updating.":[74],"Besides,":[75],"and":[78,109,123,131,139,184],"itself":[81],"vulnerable":[83],"gains":[87],"local":[88],"access.This":[90],"paper":[91],"presents":[92],"novel":[94],"approach":[95,133],"address":[97],"outstanding":[99],"current":[103],"FIT.":[104],"We":[105],"propose":[106],"design":[108],"implementation":[110],"named":[114],"XenFIT":[115,120,148,178,211,234],"for":[116],"Xen":[117],"virtual":[118],"machines.":[119,174],"monitor":[122],"fires":[124],"alarms":[125],"on":[126],"our":[132],"does":[134],"require":[136],"create":[138],"update":[140],"like":[143],"legacy":[146],"methods.":[147],"works":[149],"by":[150,193],"dynamically":[151],"patching":[152],"memory":[153],"protected":[156,173],"machine,":[157,209],"so":[158,210],"it":[159],"necessary":[162],"install":[164],"any":[165],"kernel":[166],"code":[167],"or":[168],"user-space":[169],"application":[170],"into":[171],"As":[175],"result,":[177],"almost":[180],"effortless":[181],"deploy":[183],"maintain.":[185],"In":[186],"addition,":[187],"thanks":[188],"advantage":[191],"introduced":[192],"Xen,":[194],"security":[196],"polices":[197],"as":[198,200],"well":[199],"process":[203],"put":[205],"secure":[208],"tamper-resistant":[213],"attack,":[215],"even":[216],"case":[218],"takes":[221],"VM":[225],"he":[226],"penetrating":[228],"in.":[229],"Finally,":[230],"deploying":[232],"strictly,":[233],"able":[236],"function":[238],"very":[239],"stealthily":[240],"avoid":[242],"suspect":[244],"intruder.":[247]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
