{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:47Z","timestamp":1725494387053},"publisher-location":"Berlin, Heidelberg","reference-count":56,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766261"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76627-8_21","type":"book-chapter","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T10:44:09Z","timestamp":1194259449000},"page":"266-280","source":"Crossref","is-referenced-by-count":0,"title":["Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Shlomi","family":"Dolev","sequence":"first","affiliation":[]},{"given":"Reuven","family":"Yagel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. In: ASPLOS. Proceedings of the Twelfth International Conference on Architectural Support for Programming Languages and Operating Systems, CA (2006)","DOI":"10.1145\/1168857.1168860"},{"key":"21_CR2","volume-title":"Proceedings of 1997 IEEE Symposium on Computer Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of 1997 IEEE Symposium on Computer Security and Privacy, IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"21_CR3","unstructured":"Bellard, F.: QEMU, a Fast and Portable Dynamic Translator. In: Proc. of USENIX Annual Technical Conference. FREENIX Track (2005)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: Proceedings of the nineteenth ACM symposium on Operating systems principles, Bolton Landing, NY, USA (2003)","DOI":"10.1145\/945445.945462"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Brukman, O., Dolev, S., Haviv, Y., Yagel, R.: Self-Stabilization as a Foundation for Autonomic Computing. In: FOFDC. Proceedings of the Second International Conference on Availability, Reliability and Security, Workshop on Foundations of Fault-tolerant Distributed Computing, Vienna, Austria (April 2007)","DOI":"10.1109\/ARES.2007.141"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Back, G., Hsieh, W.H., Lepreau, J.: Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In: OSDI. Proc. 4th Symposium on Operating Systems Design and Implementation, San Diego, CA (2000)","DOI":"10.21236\/ADA440101"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: A Robust Reputation System for Mobile Ad-hoc Networks. Technical Report IC\/2003\/50, EPFL-IC-LCA (2003)","DOI":"10.1201\/9780203504086.ch20"},{"key":"21_CR8","unstructured":"Bochs IA-32 Emulator Project. http:\/\/bochs.sourceforge.net\/"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Bershad, B.N., Savage, S., Pardyak, P., Sirer, E.G., Fiuchynski, M., Becker, D., Eggers, S., Chambers, C.: Extensibility, Safety, and Performance in the SPIN Operating System. In: Proceedings of the 15th ACM Symposium on Operating Systems Principles, Colorado, December (1995)","DOI":"10.1145\/224056.224077"},{"key":"21_CR10","unstructured":"Ben-Yehuda, M., Xenidis, J., Mostrows, M., Rister, K., Bruemmer, A., Van Doorn, L.: The Price of Safety: Evaluating IOMMU Performance. In: OLS. The 2007 Ottawa Linux Symposium (2007)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single-Address-Space Operating System. ACM Transactions on Computer Systems\u00a012(4) (November 1994)","DOI":"10.1145\/195792.195795"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Cai, H., Shao, Z., Vaynberg, A.: Certified Self-Modifying Code. In: Proceedings of PLDI 2007, CA (2007)","DOI":"10.1145\/1250734.1250743"},{"issue":"11","key":"21_CR13","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"E.W. Dijkstra","year":"1974","unstructured":"Dijkstra, E.W.: Self-Stabilizing Systems in Spite of Distributed Control. Communications of the ACM\u00a017(11), 643\u2013644 (1974)","journal-title":"Communications of the ACM"},{"key":"21_CR14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6156.001.0001","volume-title":"Self-Stabilization","author":"S. Dolev","year":"2000","unstructured":"Dolev, S.: Self-Stabilization. The MIT Press, Cambridge (2000)"},{"key":"21_CR15","unstructured":"Dike, J.: A User-mode Port of the Linux Kernel. In: 5th Annual Linux Showcase and Conference, Oakland, California (2001)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Daliot, A., Dolev, D.: Self-stabilizing Byzantine Agreement. In: PODC 2006. Proc. of Twenty-fifth ACM Symposium on Principles of Distributed Computing, Colorado (2006)","DOI":"10.1145\/1146381.1146405"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11864219","volume-title":"SSS 2006","author":"S. Dolev","year":"2006","unstructured":"Dolev, S., Haviv, Y.: Stabilization Enabling Technology. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol.\u00a04280, pp. 1\u201315. Springer, Heidelberg (2006)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Dolev, S., Welch, J.: Self-Stabilizing Clock Synchronization in the Presence of Byzantine Faults. In: UNLV. Proc. of the 2nd Workshop on Self-Stabilizing Systems (1995). Journal of the ACM, Vol. 51, No. 5, pp. 780-799, September 2004.","DOI":"10.1145\/1017460.1017463"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Dolev, S., Yagel, R.: Toward Self-Stabilizing Operating Systems. In: SAACS04,DEXA. Proceedings of the 15th International Conference on Database and Expert Systems Applications, 2nd International Workshop on Self-Adaptive and Autonomic Computing Systems, Zaragoza, Spain, pp. 684\u2013688 (August 2004)","DOI":"10.1109\/DEXA.2004.1333553"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Dolev, S., Yagel, R.: Memory Management for Self-Stabilizing Operating Systems. In: Proceedings of the 7th Symposium on Self Stabilizing Systems, Barcelona, Spain (2005). also in Journal of Aerospace Computing, Information, and Communication (JACIC), 2006.","DOI":"10.1007\/11577327_8"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/978-3-540-49823-0_19","volume-title":"SSS 2006","author":"S. Dolev","year":"2006","unstructured":"Dolev, S., Yagel, R.: Self-Stabilizing Device Drivers. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol.\u00a04280, pp. 276\u2013289. Springer, Heidelberg (2006)"},{"key":"21_CR22","unstructured":"ECMA International. ECMA-335 Common Language Infrastructure (CLI), 4th Edition, Technical Report (2006)"},{"key":"21_CR23","unstructured":"Ferrie, P.: Attacks on Virtual Machine Emulators. Symantec Advanced Threat Research, http:\/\/www.symantec.com\/avcenter\/reference\/Virtual_Machine_Threats.pdf"},{"key":"21_CR24","unstructured":"Goldberg, R.: Architectural Principles for Virtual Computer Systems. Ph.D. thesis, Harvard University, Cambridge, MA (1972)"},{"key":"21_CR25","unstructured":"Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility Is Not Transparency: VMM Detection Myths and Realities. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems, San Diego, CA (2007)"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavani, P., Tomkins, A.: Propagation of trust and distrust. In: WWW. Proceedings of the 13th International World Wide Web conference (2004)","DOI":"10.1145\/988672.988727"},{"key":"21_CR27","unstructured":"Gong, L., Mueller, M., Prafullchandra, H., Schemers, R.: Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997)"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of SOSP 2003 (2003)","DOI":"10.1145\/945445.945464"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Hunt, G., Larus, J.: Singularity: Rethinking the Software Stack. Operating Systems Review\u00a041(2) (April 2007)","DOI":"10.1145\/1243418.1243424"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Hunt, G., Aiken, M., Fhndrich, M., Hawblitzel, C., Hodson, O., Larus, J., Levi, S., Steensgaard, B., Tarditi, D., Wobber, T.: Sealing OS Processes to Improve Dependability and Safety. In: Proceedings of EuroSys2007, Lisbon, Portugal (March 2007)","DOI":"10.1145\/1272996.1273032"},{"key":"21_CR31","unstructured":"Intel Corporation. Reliability, Availability, and Serviceability for the Always-on Enterprise, The Enhanced RAS Capabilities of Intel Processor-based Server Platforms Simplify 24 x7 Business Solutions, Technology@Intel Magazine (August 2005), http:\/\/www.intel.com\/technology\/magazine\/Computing\/Intel_RAS_WP_0805.pdf"},{"key":"21_CR32","unstructured":"Intel Corporation. The IA-32 Intel Architecture Software Developer\u2019s Manual (2006), http:\/\/developer.intel.com\/products\/processor\/manuals\/index.htm"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer, 41\u201350 (January 2003), See also http:\/\/www.research.ibm.com\/autonomic","DOI":"10.1109\/MC.2003.1160055"},{"key":"21_CR34","unstructured":"KVM: Kernel-based Virtual Machine for Linux, http:\/\/kvm.qumranet.com\/"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.38"},{"key":"21_CR36","unstructured":"Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, Princeton University (March 1971). Reprinted in ACM Operating Systems Review (January 1974)"},{"issue":"3","key":"21_CR37","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Trans. on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Trans. on Programming Languages and Systems"},{"key":"21_CR38","unstructured":"Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA (2002)"},{"key":"21_CR39","unstructured":"Mastipuram, R., Wee, E.C.: Soft errors\u2019 impact on system reliability. Voice of Electronics Engineer (2004), http:\/\/www.edn.com\/article\/CA454636.html"},{"key":"21_CR40","volume-title":"Computer-Related Risks","author":"P.G. Neumann","year":"1995","unstructured":"Neumann, P.G.: Computer-Related Risks. Addison-Wesley, Reading (1995)"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Neiger, G., Santony, A., Leung, F., Rogers, D., Uhlig, R.: Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal\u00a010(3) (August 2006)","DOI":"10.1535\/itj.1003.01"},{"key":"21_CR42","unstructured":"Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kiciman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery Oriented Computing(ROC): Motivation, definition, techniques and case studies. UC Berkeley Computer Science Technical Report UCB\/CSD-02-1175, Berkeley, CA\u00a0 (March 2002)"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Popek, G.J., Goldberg, R.P.: Formal Requirements for Virtualizable Third Generation Architectures. Communications of the ACM\u00a017(7), 412\u2013421 (1974)","DOI":"10.1145\/361011.361073"},{"key":"21_CR44","doi-asserted-by":"crossref","unstructured":"Swift, M., Bershad, B.N., Levy, H.M.: Improving the reliability of commodity operating systems. In: SOSP 2003. Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY (October 2003). See also: M. Swift. Improving the Reliability of Commodity Operating Systems, Ph.D. Dissertation, University of Washington (2005)","DOI":"10.1145\/945465.945466"},{"key":"21_CR45","unstructured":"Sharma, A., Welch, S.: Preserving the integrity of enterprise platforms via an Assured eXecution Environment (AxE). In: OSDI. A poster at the 7th Symposium on Operating Systems Design and Implementation (2006)"},{"key":"21_CR46","unstructured":"Rutkowska, J.: \u201cSubvirting Vista Kernel For Fun and Profit \u2014 Part II Blue Pill\u201d , see also (2006), http:\/\/www.whiteacid.org\/misc\/bh2006\/070_Rutkowska.pdf , http:\/\/www.whiteacid.org\/papers\/redpill.html"},{"key":"21_CR47","doi-asserted-by":"crossref","unstructured":"Robin, J., Irvine, C.: Analysis of the Intel Pentiums Ability to Support a Secure Virtual Machine Monitor. In: Usenix annual technical conference (2000)","DOI":"10.21236\/ADA423654"},{"key":"21_CR48","doi-asserted-by":"crossref","unstructured":"Ray, E., Schultz, E.E.: An early look at Windows Vista security. Computer Fraud & Security\u00a02007(1) (2007)","DOI":"10.1016\/S1361-3723(07)70005-2"},{"key":"21_CR49","unstructured":"Schroeder, M.D.: Cooperation of Mutually Suspicious Subsystems in a Computer Utility. Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA (September 1972)"},{"key":"21_CR50","unstructured":"SOS download page. http:\/\/www.cs.bgu.ac.il\/~yagel\/sos , 2007"},{"key":"21_CR51","doi-asserted-by":"crossref","unstructured":"Soltesz, S., P\u00f6tzl, H., Fiuczynski, M.E., Bavier, A., Peterson, L.: Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In: Proceedings of the 2007 EuroSys conference, Lisbon, Portugal (2007)","DOI":"10.1145\/1272996.1273025"},{"key":"21_CR52","unstructured":"http:\/\/www.selfstabilization.org"},{"issue":"9","key":"21_CR53","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J.H. Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE\u00a063(9), 1268\u20131308 (1975)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR54","unstructured":"Sun Microsystems, Inc. \u2018Predictive Self-Healing in the SolarisTM 10 Operating System\u201d, White paper (September 2004), http:\/\/www.sun.com\/software\/solaris\/ds\/self_healing.pdf"},{"key":"21_CR55","unstructured":"Tygar, J.D., Yee, B.: Dyad: A system for using physically secure coprocessors. In: Proceedings of IP Workshop (1994)"},{"key":"21_CR56","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient Software-based fault isolation. In: Proceedings of the Sym. On Operating System Principles (1993)","DOI":"10.1145\/168619.168635"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76627-8_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:55:25Z","timestamp":1619506525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76627-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540766261"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76627-8_21","relation":{},"subject":[]}}