{"id":"https://openalex.org/W2968164216","doi":"https://doi.org/10.1145/3339252.3340511","title":"IO-Trust","display_name":"IO-Trust","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968164216","doi":"https://doi.org/10.1145/3339252.3340511","mag":"2968164216"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049234679","display_name":"Ahmad Atamli","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ahmad Atamli","raw_affiliation_strings":["Alan Turing Institute, London, UK"],"affiliations":[{"raw_affiliation_string":"Alan Turing Institute, London, UK","institution_ids":["https://openalex.org/I4210128584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059881481","display_name":"Giuseppe Petracca","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Giuseppe Petracca","raw_affiliation_strings":["The Pennsylvania State University, Univerisy Park, PA, US"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, Univerisy Park, PA, US","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062093738","display_name":"Jon Crowcroft","orcid":"https://orcid.org/0000-0002-7013-0121"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]},{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jon Crowcroft","raw_affiliation_strings":["Alan Turing Institute, University of Cambridge, London, UK"],"affiliations":[{"raw_affiliation_string":"Alan Turing Institute, University of Cambridge, London, UK","institution_ids":["https://openalex.org/I4210128584","https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049234679"],"corresponding_institution_ids":["https://openalex.org/I4210128584"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77971003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8580369353294373},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8115673065185547},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.624809205532074},{"id":"https://openalex.org/keywords/data-acquisition","display_name":"Data acquisition","score":0.5111642479896545},{"id":"https://openalex.org/keywords/pci-express","display_name":"PCI Express","score":0.43531349301338196},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.42538005113601685},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3923991322517395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34410005807876587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8580369353294373},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8115673065185547},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.624809205532074},{"id":"https://openalex.org/C163985040","wikidata":"https://www.wikidata.org/wiki/Q1172399","display_name":"Data acquisition","level":2,"score":0.5111642479896545},{"id":"https://openalex.org/C64270927","wikidata":"https://www.wikidata.org/wiki/Q206924","display_name":"PCI Express","level":3,"score":0.43531349301338196},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.42538005113601685},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3923991322517395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34410005807876587},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3339252.3340511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1529535786","https://openalex.org/W1583301963","https://openalex.org/W1641762327","https://openalex.org/W2014113877","https://openalex.org/W2070041400","https://openalex.org/W2094041165","https://openalex.org/W2119251836","https://openalex.org/W2120118950","https://openalex.org/W2122122011","https://openalex.org/W2125895608","https://openalex.org/W2140807364","https://openalex.org/W2142633847","https://openalex.org/W2574215789","https://openalex.org/W4243560869","https://openalex.org/W4289038676","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W4385894176","https://openalex.org/W2347371119","https://openalex.org/W2612768808","https://openalex.org/W3131402800","https://openalex.org/W2388965158","https://openalex.org/W3135214639","https://openalex.org/W4313196190","https://openalex.org/W2360600936","https://openalex.org/W2380007799","https://openalex.org/W2102656074"],"abstract_inverted_index":{"Modern":[0],"malware":[1,33,130],"is":[2,55,76,160,173,179,198],"complex,":[3],"stealthy,":[4],"and":[5,34,175],"employ":[6],"anti-forensics":[7],"techniques":[8],"to":[9,14,106,129,163,201],"evade":[10],"detection.":[11],"In":[12,136],"order":[13],"detect":[15],"malware,":[16],"data":[17,49,65,73,88,147,152,193],"must":[18],"be":[19],"collected,":[20],"such,":[21],"allows":[22,144],"further":[23],"analyses":[24],"of":[25,113],"the":[26,32,35,40,48,52,80,91,116,124,146,196,203],"malware's":[27],"behaviour.":[28],"However,":[29],"when":[30,79,158,195],"both":[31],"detecting":[36],"system":[37],"run":[38],"on":[39,86,90,151],"same":[41],"domain":[42],"(the":[43],"CPU)":[44],"it's":[45],"questionable":[46],"whether":[47],"acquired":[50],"by":[51,115],"acquisition":[53,74,81,194],"method":[54,82,142],"not":[56,84,134,180,199],"tampered":[57],"with.":[58],"Hardware":[59],"based":[60,101],"techniques,":[61],"such":[62],"as":[63],"acquiring":[64,145],"out-of-band":[66],"using":[67],"a":[68,111,141,181,188],"PCIe":[69],"device":[70],"allow":[71],"for":[72,191],"that":[75,143],"deemed":[77],"trusted":[78,200],"does":[83],"rely":[85],"any":[87],"present":[89,140],"host":[92,107,155,170,197],"memory.":[93],"Unfortunately,":[94],"in":[95,123,154,183],"Input-Output":[96],"Memory":[97],"Management":[98],"Unit":[99],"(IOMMU)":[100],"systems,":[102],"peripheral":[103],"devices":[104],"access":[105],"memory":[108,126,172],"go":[109],"through":[110],"stage":[112],"translation":[114,119],"IOMMU.":[117],"The":[118],"tables":[120],"which":[121],"reside":[122],"host's":[125],"are":[127,133],"subject":[128],"control,":[131],"hence":[132],"trustworthy.":[135],"this":[137,178],"paper":[138],"we":[139],"reliably":[148],"without":[149],"dependant":[150],"residing":[153],"memory,":[156],"even":[157],"IOMMU":[159],"being":[161],"used":[162],"restrict":[164],"devices.":[165],"We":[166],"show":[167],"how":[168],"accessing":[169],"physical":[171],"achieved":[174],"discuss":[176],"why":[177],"vulnerability":[182],"some":[184],"platforms,":[185],"but":[186],"rather":[187],"powerful":[189],"tool":[190],"securing":[192],"perform":[202],"acquisition.":[204]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-08-22T00:00:00"}
