{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:38Z","timestamp":1761621158604,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":27,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_3","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"57-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Hardware-Enhanced Security for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Jakub","family":"Szefer","sequence":"first","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"3_CR1","unstructured":"ARM, TrustZone. http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone.php, accessed April 2013."},{"key":"3_CR2","unstructured":"VMWare. http:\/\/www.vmware.com\/, accessed April 2013."},{"key":"3_CR3","unstructured":"Xen. http:\/\/www.xen.org, accessed May 2013."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"David Champagne. Scalable Security Architecture for Trusted Software. PhD thesis, Princeton University, 2010.","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"David Champagne and Ruby\u00a0B. Lee. Scalable architectural support for trusted software. In Proceedings of the 16th International Symposium on High Performance Computer Architecture, HPCA, pages 1\u201312, 2010.","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Jeffrey\u00a0S. Dwoskin and Ruby\u00a0B. Lee. Hardware-rooted trust for secure key management and transient trust. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS \u201907, pages 389\u2013400, 2007.","DOI":"10.1145\/1315245.1315294"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Joan\u00a0G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean\u00a0W. Smith, and Steve Weingart. Building the IBM 4758 Secure Coprocessor. Computer, 34:57\u201366, 2001.","DOI":"10.1109\/2.955100"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: A virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev., 37(5):193\u2013206, 2003.","DOI":"10.1145\/1165389.945464"},{"key":"3_CR9","unstructured":"Tal Garfinkel and Mendel Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings Network and Distributed Systems Security Symposium, pages 191\u2013206, 2003."},{"key":"3_CR10","unstructured":"Ruby\u00a0B. Lee, Peter Kwan, John\u00a0Patrick McGregor, Jeffrey Dwoskin, and Zhenghong Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the International Symposium on Computer Architecture, ISCA, pages 2\u201313, 2005."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chunxiao Li, Anand Raghunathan, and Niraj\u00a0K. Jha. Secure virtual machine execution under an untrusted management OS. In Proceedings Conference on Cloud Computing (CLOUD), pages 172\u2013179, 2010.","DOI":"10.1109\/CLOUD.2010.29"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"David Lie, John\u00a0C. Mitchell, Chandramohan\u00a0A. Thekkath, and Mark Horowitz. Specifying and verifying hardware for tamper-resistant software. In Proceedings of Symposium on Security and Privacy, S&P, pages 166\u2013177, 2003.","DOI":"10.1109\/SECPRI.2003.1199335"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, volume 5230 of Lecture Notes in Computer Science, pages 1\u201320. Springer Berlin Heidelberg, 2008.","DOI":"10.1007\/978-3-540-87403-4_1"},{"key":"3_CR14","unstructured":"Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert\u00a0Van Doorn, John\u00a0Linwood Griffin, Stefan Berger, Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Doorn, John Linwood, and Griffin\u00a0Stefan Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, 2005."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SIGOPS Oper. Syst. Rev., 41(6):335\u2013350, 2007.","DOI":"10.1145\/1323293.1294294"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Monirul\u00a0I. Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909, pages 477\u2013487, 2009.","DOI":"10.1145\/1653662.1653720"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Udo Steinberg and Bernhard Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In European Conference on Computer Systems, pages 209\u2013222, 2010.","DOI":"10.1145\/1755913.1755935"},{"key":"3_CR18","unstructured":"G.\u00a0Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Proceedings of the 17th annual International Conference on Supercomputing, ICS \u201903, pages 160\u2013171, 2003."},{"key":"3_CR19","unstructured":"Jakub Szefer. Architectures for Secure Cloud Computing Servers. PhD thesis, Princeton University, 2013."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Jakub Szefer and Ruby\u00a0B. Lee. A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing. In Proceedings of the Second International Workshop on Security and Privacy in Cloud Computing, SPCC, pages 248\u2013252, 2011.","DOI":"10.1109\/ICDCSW.2011.51"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Jakub Szefer and Ruby\u00a0B. Lee. Architectural Support for Hypervisor-Secure Virtualization. In Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, pages 437\u2013450, March 2012.","DOI":"10.1145\/2248487.2151022"},{"key":"3_CR22","unstructured":"Trusted Computing Group Trusted Platform Module main specification version 1.2, revision 94. http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification, accessed April 2013."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Carl\u00a0A. Waldspurger. Memory resource management in VMware ESX server. In 5th Symposium on Operating Systems Design and Implementation (OSDI), pages 181\u2013194, 2002.","DOI":"10.1145\/844128.844146"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Zhenghong Wang and Ruby\u00a0B. Lee. New cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 34th annual International Symposium on Computer Architecture, ISCA \u201907, pages 494\u2013505, 2007.","DOI":"10.1145\/1273440.1250723"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Zhenghong Wang and Ruby\u00a0B. Lee. A novel cache architecture with enhanced performance and security. In Proceedings of the 41st annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 41, pages 83\u201393, 2008.","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Zhi Wang and Xuxian Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, S&P, pages 380\u2013395, May 2010.","DOI":"10.1109\/SP.2010.30"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, pages 545\u2013554, 2009.","DOI":"10.1145\/1653662.1653728"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:50:54Z","timestamp":1746118254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_3","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}