{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:38:00Z","timestamp":1725568680891},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642144516"},{"type":"electronic","value":"9783642144523"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14452-3_16","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T16:30:15Z","timestamp":1288715415000},"page":"349-366","source":"Crossref","is-referenced-by-count":1,"title":["On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation"],"prefix":"10.1007","author":[{"given":"Loic","family":"Duflot","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Grumelard","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Levillain","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Morin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,12]]},"reference":[{"key":"16_CR1","volume-title":"Programmed I\/O Accesses: A Threat to Virtual Machine Monitors.","author":"L. Absil","year":"2007","unstructured":"L. Absil, L. Duflot, in Programmed I\/O Accesses: A Threat to Virtual Machine Monitors. Pacific Security Conference PacSec07, Tokyo, Japan, 29\u201330 Nov 2007"},{"key":"16_CR2","unstructured":"Advanced Micro Devices (AMD). AMD Virtualisation Solutions, 2007. http:\/\/www.amd.com\/virtualization\/"},{"key":"16_CR3","first-page":"296","volume-title":"Trojan Detection Using IC Fingerprinting.","author":"D. Agrawal","year":"2007","unstructured":"D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan Detection Using IC Fingerprinting. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 20\u201323 May 2007, pp. 296\u2013310"},{"key":"16_CR4","unstructured":"F. Bellard, QEMU Open Source Processor Emulator, 2007 http:\/\/wiki.qemu.org\/"},{"key":"16_CR5","first-page":"245","volume-title":"Dictionary Attacks Using Keyboard Acoustic Emanations.","author":"Y. Berger","year":"2006","unstructured":"Y. Berger, A. Wool, A. Yeredor, in Dictionary Attacks Using Keyboard Acoustic Emanations. CCS\u201906: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 Oct\u20133 Nov, 2006 (ACM Press, New York, NY, 2006), pp. 245\u2013254"},{"key":"16_CR6","unstructured":"D. J. Bernstein, Cache Timing Attacks on AES. Technical Report, The University of Illinois at Chicago, 2005."},{"key":"16_CR7","volume-title":"AES Power Attack Based on Induced Cache Miss and Countermeasure.","author":"G. Bertoni","year":"2005","unstructured":"G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, in AES Power Attack Based on Induced Cache Miss and Countermeasure. ITCC\u201905: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, 4\u20136 Apr 2005"},{"key":"16_CR8","volume-title":"Bug Attacks.","author":"E. Biham","year":"2008","unstructured":"E. Biham, Y. Carmeli, A. Shamir, in Bug Attacks. CRYPTO, Santa Barbara, CA, USA, 17\u201321 Aug 2008"},{"key":"16_CR9","unstructured":"BSDDaemon, coideloko, and D0nAnd0n, System Management Mode Hack: Using SMM for Other Purposes. Phrack Magazine, 2008. http:\/\/www.phrack.org\/"},{"key":"16_CR10","volume-title":"Cloaker: Hardware Supported Rootkit Concealment.","author":"F. David","year":"2008","unstructured":"F. David, E. Chan, J. Carlyle, R. Campbell, in Cloaker: Hardware Supported Rootkit Concealment. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 18\u201321 May 2008"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"G. Duc, R. Keryell, Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection. Ann. Comput. Secur. Appl. Conf., 483\u2013492 (Shanghai, China, 6\u20138 Sept 2006)","DOI":"10.1109\/ACSAC.2006.21"},{"key":"16_CR12","volume-title":"CPU Bugs, CPU Backdoors and Consequences on Security.","author":"L. Duflot","year":"2008","unstructured":"L. Duflot, in CPU Bugs, CPU Backdoors and Consequences on Security. ESORICS 2008: Proceedings of the 13th European Symposium on Research Computer Security, Malaga, Spain, 6\u20138 Oct 2008"},{"key":"16_CR13","unstructured":"L. Duflot, O. Grumelard, O. Levillain, B. Morin, in Getting into the SMRAM: SMM Reloaded. CanSecWest Applied Security Conference 2009, Vancouver, Canada, 18\u201320 Mar 2009"},{"key":"16_CR14","volume-title":"ACPI: Design Principles and Concerns.","author":"L. Duflot","year":"2009","unstructured":"L. Duflot, O. Levillain, B. Morin, in ACPI: Design Principles and Concerns. Trust 2009, Oxford, UK, 6\u20138 Apr 2009"},{"key":"16_CR15","volume-title":"The System Management Mode (SMM) Rootkit.","author":"S. Embleton","year":"2008","unstructured":"S. Embleton, S. Sparks, in The System Management Mode (SMM) Rootkit. Black Hat Briefings, Washington, DC, USA, 18\u201321 Feb 2008"},{"key":"16_CR16","unstructured":"EMSCB Consortium. Turaya EMSCB, 2005. http:\/\/www.emscb.com\/content\/pages\/ emscb.turaya.htm"},{"key":"16_CR17","unstructured":"French National Research Agency. Secure and isolated operating system challenge, 2008. http:\/\/secsi.adullact.net\/"},{"key":"16_CR18","unstructured":"GNU. Linux VServer, 2007. http:\/\/linux-vserver.org"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"J. Heasman, in Implementing and Detecting an ACPI BIOS Rootkit. Blackhat Federal 2006, Washington, DC, USA, 23\u201326 Jan 2006","DOI":"10.1016\/S1353-4858(06)70326-9"},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1278901.1278904","volume":"41","author":"G. Heiser","year":"2007","unstructured":"G. Heiser, K. Elphinstone, I. Kuz, G. Klein, S. Petters, Towards trustworthy computing systems: Taking microkernels to the next level. ACM SIGOPS Oper. Syst. Rev. 41(4), 3\u201311 (July, 2007)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"16_CR21","unstructured":"Intel Corp. Intel 64 and IA 32 architectures software developer\u2019s manual volume 3A: system programming guide part 1, 2007"},{"key":"16_CR22","unstructured":"Intel Corp. Intel 64 and IA 32 architectures software developer\u2019s manual volume 3A: system programming guide part 2, 2007"},{"key":"16_CR23","unstructured":"JEDEC. DDR2 specification, Nov 2009"},{"key":"16_CR24","volume-title":"Jails: Confining the Omnipotent Root.","author":"P.-H. Kamp","year":"2000","unstructured":"P.-H. Kamp, R.N.M. Watson, in Jails: Confining the Omnipotent Root. Proceedings of the 2nd International SANE Conference, Maastricht, The Netherlands, 22\u201325 May 2000"},{"key":"16_CR25","volume-title":"Remote Code Execution Through Intel CPU bugs.","author":"K. Kaspersky","year":"2008","unstructured":"K. Kaspersky, in Remote Code Execution Through Intel CPU bugs. Hack In The Box Security Conference, Kuala Lumpur, Malaysia, 27\u201330 Oct 2008"},{"key":"16_CR26","unstructured":"O. Kaya, J.-P. Seifert, On the Power of Simple Branch Prediction Analysis. Cryptology ePrint Archive, 2006. http:\/\/eprint.iacr.org\/2006\/351.pdf"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"S. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, Y. Zhou, in Designing and Implementing Malicious Hardware. Proceedings of the First USENIX Workshop on Large Scale Exploits and Emergent Threats, LEET\u201908, San Francisco, CA, USA, 15 Apr 2008","DOI":"10.1145\/1346281.2181012"},{"key":"16_CR28","unstructured":"C. Lauradoux, in Collision Attacks on Processors with Cache and Countermeasures. WeWorC \u201905: Western European Workshop on Research in Cryptology, Leuven, Belgium, 5\u20137 July 2005"},{"issue":"11","key":"16_CR29","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/356989.357005","volume":"35","author":"D. Lie","year":"2000","unstructured":"D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, Architectural support for copy and tamper resistant software. ACM SIGPLAN Not. 35(11), 168\u2013177 (2000)","journal-title":"ACM SIGPLAN Not."},{"key":"16_CR30","unstructured":"R. Merkle, Secrecy, Authentication and Public Key Systems \u2013 A Certified Digital Signature. Ph.D. thesis, Department of Electrical Engineering, Stanford University, 1979"},{"key":"16_CR31","unstructured":"National Security Agency. NetTop, 2009. http:\/\/www.nsa.gov\/research\/tech_transfer\/ fact_sheets-\/nettop.shtml"},{"key":"16_CR32","volume-title":"Preventing and Detecting Xen Hypervisor Subversions.","author":"J. Rutkowska","year":"2008","unstructured":"J. Rutkowska, R. Wojtczuk, in Preventing and Detecting Xen Hypervisor Subversions. Blackhat Briefings, Washington, DC, USA, 18\u201321 Feb 2008"},{"key":"16_CR33","volume-title":"Persistent BIOS Infection.","author":"A. Sacco","year":"2009","unstructured":"A. Sacco A. Ortega, in Persistent BIOS Infection. CanSecWest Conference, Vancouver, Canada, 18\u201320 Mar 2009"},{"key":"16_CR34","first-page":"160","volume-title":"Aegis: Architecture for Tamper-Evident and Tamper-Resistant Processing.","author":"G.E. Suh","year":"2003","unstructured":"G.E. Suh, D. Clarke, B. Gassend, M. van Dijk, S. Devadas, in Aegis: Architecture for Tamper-Evident and Tamper-Resistant Processing. ICS \u201903: Proceedings of the 17th Annual International Conference on Supercomputing, San Francisco, CA, USA, 23\u201326 June 2003 (ACM, New York, NY, 2003), pp. 160\u2013171"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi, in Cryptanalysis of DES Implemented on Computers with Cache. CHES \u201903: Proceedings of the 4th Workshop on Cryptographic Hardware and Embedded Software, Cologne, Germany, 7\u201310 Sept 2003","DOI":"10.1007\/978-3-540-45238-6_6"},{"key":"16_CR36","unstructured":"University of Cambridge. Xen Virtual Machine Monitor, 2007. http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/xen\/"},{"key":"16_CR37","unstructured":"J. Vanegue, in Hacking PXE Without Reboot. BA-Con Argentina, 2008"},{"key":"16_CR38","unstructured":"VMware Inc. VMware Virtualisation Software, 2007"},{"key":"16_CR39","unstructured":"R. Wojtczuk, J. Rutkowska, in Attacking Intel Trusted Execution Technology. Blackhat Federal 2009, 2009"},{"key":"16_CR40","first-page":"373","volume-title":"Keyboard Acoustic Emanations Revisited.","author":"L. Zhuang","year":"2005","unstructured":"L. Zhuang, F. Zhou, J.D. Tygar, in Keyboard Acoustic Emanations Revisited. CCS \u201905: Proceedings of the 12th ACM Conference on Computer and Communications Security Alexandria, VA, USA, 7\u201311 Nov 2005 (ACM Press, New York, NY, 2005), pp. 373\u2013382"},{"issue":"5","key":"16_CR41","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1037949.1024403","volume":"38","author":"X. Zhuang","year":"2004","unstructured":"X. Zhuang, T. Zhang, S. Pande, Hide: An infrastructure for efficiently protecting information leakage on the address bus. ACM SIGOPS Oper. Syst. Rev. 38(5), 72\u201384 (2004)","journal-title":"ACM SIGOPS Oper. Syst. Rev."}],"container-title":["Information Security and Cryptography","Towards Hardware-Intrinsic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14452-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T03:01:28Z","timestamp":1685847688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14452-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144516","9783642144523"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14452-3_16","relation":{},"ISSN":["1619-7100"],"issn-type":[{"type":"print","value":"1619-7100"}],"subject":[],"published":{"date-parts":[[2010]]}}}