{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:35:21Z","timestamp":1762032921129,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_8","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"92-106","source":"Crossref","is-referenced-by-count":7,"title":["CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization"],"prefix":"10.1007","author":[{"given":"Flavio","family":"Lombardi","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1735688.1735706","volume-title":"Proceedings of the 3rd Workshop on General-Purpose Computation on Graphics Processing Units, GPGPU 2010","author":"P. Bakkum","year":"2010","unstructured":"Bakkum, P., Skadron, K.: Accelerating SQL database operations on a GPU with CUDA. In: Proceedings of the 3rd Workshop on General-Purpose Computation on Graphics Processing Units, GPGPU 2010, pp. 94\u2013103. ACM, New York (2010)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Catteddu, D., Hogben, G.: Cloud computing: Benefits, risks and recommendations for information security (2009), http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"8_CR3","unstructured":"Nvidia Corporation. Nvidia\u2019s next generation CUDA compute architecture: Fermi (2009), http:\/\/www.nvidia.com\/content\/PDF\/fermi_white_papers\/NVIDIA_Fermi_Compute_Architecture_Whitepaper.pdf"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1618525.1618534","volume":"43","author":"M. Dowty","year":"2009","unstructured":"Dowty, M., Sugerman, J.: GPU virtualization on VMware\u2019s hosted I\/O architecture. SIGOPS Oper. Syst. Rev.\u00a043(3), 73\u201382 (2009)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1519138.1519141","volume-title":"Proceedings of the 3rd ACM Workshop on System-level Virtualization for High Performance Computing, HPCVirt 2009","author":"V. Gupta","year":"2009","unstructured":"Gupta, V., Gavrilovska, A., Schwan, K., Kharche, H., Tolia, N., Talwar, V., Ranganathan, P.: GViM: Gpu-accelerated virtual machines. In: Proceedings of the 3rd ACM Workshop on System-level Virtualization for High Performance Computing, HPCVirt 2009, pp. 17\u201324. ACM, New York (2009)"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1368506.1368517","volume":"42","author":"B. Hay","year":"2008","unstructured":"Hay, B., Nance, K.: Forensics examination of volatile system data using virtual introspection. SIGOPS Oper. Syst. Rev.\u00a042(3), 74\u201382 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1133572.1133615","volume-title":"Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW11","author":"M. Hohmuth","year":"2004","unstructured":"Hohmuth, M., Peter, M., H\u00e4rtig, H., Shapiro, J.S.: Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, EW11, p. 22. ACM, New York (2004)"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/DASC.2009.123","volume-title":"Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009","author":"G. Hu","year":"2009","unstructured":"Hu, G., Ma, J., Huang, B.: Password recovery for RAR files using CUDA. In: Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Washington, DC, USA, pp. 486\u2013490. IEEE Computer Society, Los Alamitos (2009)"},{"key":"8_CR10","first-page":"33","volume-title":"Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE 2007","author":"H. Andres Lagar-Cavilla","year":"2007","unstructured":"Andres Lagar-Cavilla, H., Tolia, N., Satyanarayanan, M., de Lara, E.: Vmm-independent graphics acceleration. In: Proceedings of the 3rd International Conference on Virtual Execution Environments, VEE 2007, pp. 33\u201343. ACM, New York (2007)"},{"key":"8_CR11","first-page":"1","volume-title":"Proceedings of the 2009 IEEE International Symposium on Parallel & Distributed Processing, IPDPS 2009","author":"S. Lin","year":"2009","unstructured":"Lin, S., Hao, C., Jianhua, S.: vCUDA: GPU accelerated high performance computing in virtual machines. In: Proceedings of the 2009 IEEE International Symposium on Parallel & Distributed Processing, IPDPS 2009, Washington, DC, USA, pp. 1\u201311. IEEE Computer Society, Los Alamitos (2009)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Lombardi, F., Di Pietro, R.: Kvmsec: a security extension for linux kernel virtual machines. In: Proceedings of the 2009 ACM Symposium on Applied Computing, SAC 2009, pp. 2029\u20132034. ACM, New York (2009)","DOI":"10.1145\/1529282.1529733"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. Journal of Network and Computer Applications (2010) (in Press) (accepted manuscript), doi: 10.1016\/j.jnca.2010.06.008","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"8_CR14","first-page":"948","volume-title":"Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2010","author":"F. Lombardi","year":"2010","unstructured":"Lombardi, F., Di Pietro, R.: A security management architecture for the protection of kernel virtual machines. In: Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2010, Washington, DC, USA, pp. 948\u2013953. IEEE Computer Society, Los Alamitos (June 2010)"},{"key":"8_CR15","first-page":"33","volume-title":"ACM SIGGRAPH 2004 Course Notes, SIGGRAPH 2004","author":"D. Luebke","year":"2004","unstructured":"Luebke, D., Harris, M., Kr\u00fcger, J., Purcell, T., Govindaraju, N., Buck, I., Woolley, C., Lefohn, A.: GPGPU: general purpose computation on graphics hardware. In: ACM SIGGRAPH 2004 Course Notes, SIGGRAPH 2004, p. 33. ACM, New York (2004)"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1145\/1632149.1632170","volume-title":"Proceedings of the 2009 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2009","author":"A. Nottingham","year":"2009","unstructured":"Nottingham, A., Irwin, B.: GPU packet classification using OpenCL: a consideration of viable classification methods. In: Proceedings of the 2009 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2009, pp. 160\u2013169. ACM, New York (2009)"},{"key":"8_CR17","first-page":"124","volume-title":"Proceedings of the 2009 9th IEEE\/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009","author":"D. Nurmi","year":"2009","unstructured":"Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., Zagorodnov, D.: The Eucalyptus open-source cloud-computing system. In: Proceedings of the 2009 9th IEEE\/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009, Washington, DC, USA, pp. 124\u2013131. IEEE Computer Society, Los Alamitos (2009)"},{"key":"8_CR18","unstructured":"Phoronix. Phoronix test suite (2009), http:\/\/phoronix-test-suite.com\/"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Ranadive, A., Gavrilovska, A., Schwan, K.: IBMon: monitoring vmm-bypass capable infiniband devices using memory introspection. In: Proceedings of the 3rd ACM Workshop on System-level Virtualization for High Performance Computing, HPCVirt 2009, pp. 25\u201332. ACM, New York (2009)","DOI":"10.1145\/1519138.1519142"},{"key":"8_CR20","first-page":"103","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2009","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromert, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2009, pp. 103\u2013115. ACM, New York (2009)"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1294261.1294294","volume-title":"Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007","author":"A. Seshadri","year":"2007","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335\u2013350. ACM, New York (2007)"},{"key":"8_CR22","first-page":"87","volume-title":"Proceedings of the 7th ACM International Conference on Computing Frontiers, CF 2010","author":"A. Tumeo","year":"2010","unstructured":"Tumeo, A., Villa, O., Sciuto, D.: Efficient pattern matching on GPUs for intrusion detection systems. In: Proceedings of the 7th ACM International Conference on Computing Frontiers, CF 2010, pp. 87\u201388. ACM, New York (2010)"},{"key":"8_CR23","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/990036.990059","volume-title":"Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004","author":"G. Zanin","year":"2004","unstructured":"Zanin, G., Mancini, L.V.: Towards a formal model for security policies specification and validation in the SElinux system. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT 2004, pp. 136\u2013145. ACM, New York (2004)"},{"key":"8_CR24","first-page":"109","volume-title":"Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems, ICCPS 2010","author":"C. Zimmer","year":"2010","unstructured":"Zimmer, C., Bhat, B., Mueller, F., Mohan, S.: Time-based intrusion detection in cyber-physical systems. In: Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems, ICCPS 2010, pp. 109\u2013118. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T19:25:50Z","timestamp":1636917950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}