{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:39:26Z","timestamp":1775839166564,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642545245","type":"print"},{"value":"9783642545252","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_8","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"91-102","source":"Crossref","is-referenced-by-count":11,"title":["Virtual Machine Isolation"],"prefix":"10.1007","author":[{"given":"R.","family":"Jithin","sequence":"first","affiliation":[]},{"given":"Priya","family":"Chandran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Smith, J.E., Nair, R.: Virtual Machines: Versatile Platform for Systems and Processes. Morgan Kaufmann (2006)","DOI":"10.1016\/B978-155860910-5\/50004-5"},{"key":"8_CR2","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol.\u00a02, pp. 273\u2013286. USENIX Association (2005)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1145\/2382196.2382318","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"J. Xiao","year":"2012","unstructured":"Xiao, J., Xu, Z., Huang, H., Wang, H.: A covert channel construction in a virtualized environment. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 1040\u20131042. ACM, New York (2012), http:\/\/doi.acm.org\/10.1145\/2382196.2382318"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Wu, J.Z., Ding, L., Wang, Y., Han, W.: Identification and evaluation of sharing memory covert timing channel in xen virtual machines. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 283\u2013291. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.10"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/2382196.2382230","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"Y. Zhang","year":"2012","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-vm side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 305\u2013316. ACM, New York (2012), http:\/\/doi.acm.org\/10.1145\/2382196.2382230"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Li, Y., Shen, Q., Zhang, C., Sun, P., Chen, Y., Qing, S.: A covert channel using core alternation. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 324\u2013328. IEEE (2012)","DOI":"10.1109\/WAINA.2012.103"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Li, H., Zhu, J., Zhou, T., Wang, Q.: A new mechanism for preventing hvm-aware malware. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 163\u2013167. IEEE (2011)","DOI":"10.1109\/ICCSN.2011.6014696"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"King, S.T., Chen, P.M.: Subvirt: Implementing malware with virtual machines. In: 2006 IEEE Symposium on Security and Privacy, p. 14. IEEE (2006)","DOI":"10.1109\/SP.2006.38"},{"key":"8_CR9","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: Empirical exploitation of live virtual machine migration. In: Proc. of BlackHat DC convention (2008)"},{"issue":"5","key":"8_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. ACM SIGOPS Operating Systems Review\u00a037(5), 164\u2013177 (2003)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"4","key":"8_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR12","first-page":"29","volume-title":"Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW 2011","author":"Y. Xu","year":"2011","unstructured":"Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., Schlichting, R.: An exploration of l2 cache covert channels in virtualized environments. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW 2011, pp. 29\u201340. ACM, New York (2011), http:\/\/doi.acm.org\/10.1145\/2046660.2046670"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/1774088.1774125","volume-title":"Proceedings of the 2010 ACM Symposium on Applied Computing, SAC 2010","author":"K. Okamura","year":"2010","unstructured":"Okamura, K., Oyama, Y.: Load-based covert channels between xen virtual machines. In: Proceedings of the 2010 ACM Symposium on Applied Computing, SAC 2010, pp. 173\u2013180. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1774088.1774125"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Gong, X., Kiyavash, N., Venkitasubramaniam, P.: Information theoretic analysis of side channel information leakage in fcfs schedulers. In: 2011 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 1255\u20131259. IEEE (2011)","DOI":"10.1109\/ISIT.2011.6033737"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Jaskolka, J., Khedri, R.: Exploring covert channels. In: 2011 44th Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/HICSS.2011.201"},{"key":"8_CR16","unstructured":"Kaleeswaran, S.: Managing covert information leaks in xen virtual machine systems. Master\u2019s thesis. NIT Calicut (May 2010)"},{"key":"8_CR17","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Blue_Pill_%28software%29"},{"key":"8_CR18","unstructured":"Myers, M., Youndt, S.: An introduction to hardware-assisted virtual machine (hvm) rootkits. White Paper of Crucial Security (2007)"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2008.24","volume":"6","author":"M. Carbone","year":"2008","unstructured":"Carbone, M., Lee, W., Zamboni, D.: Taming virtualization. IEEE Security & Privacy\u00a06(1), 65\u201367 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1535\/itj.1003.02","volume":"10","author":"D. Abramson","year":"2006","unstructured":"Abramson, D., Jackson, J., Muthrasanallur, S., Neiger, G., Regnier, G., Sankaran, R., Schoinas, I., Uhlig, R., Vembu, B., Wiegert, J.: Intel virtualization technology for directed i\/o. Intel Technology Journal\u00a010, 178\u2013192 (2006)","journal-title":"Intel Technology Journal"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 51\u201362. ACM (2008)","DOI":"10.1145\/1455770.1455779"},{"key":"8_CR22","unstructured":"Hardware-assisted virtualization technology, Intel, Web Article (2012), http:\/\/www.intel.in\/content\/www\/in\/en\/virtualization\/virtualization-technology\/hardware-assist-virtualization-embedded-technology.html (retrieved December 10, 2012)"},{"key":"8_CR23","unstructured":"K\u00f6nig, A., Steinmetz, R.: Detecting migration of virtual machines. In: Proceedings of the 10th W\u00fcrzburg Workshop on IP: Joint ITG, ITC, and Euro-NF Workshop Visions of Future Generation Networks (EuroView 2011), Julius-Maximilians-Universit\u00e4t W\u00fcrzburg, Lehrstuhl f\u00fcr Informatik III (2011)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Shetty, J., Anala, M.R., Shobha, G.: A survey on techniques of secure live migration of virtual machine. International Journal of Computer Applications\u00a039(12) (2012)","DOI":"10.5120\/4875-7305"},{"key":"8_CR25","unstructured":"Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: Proc. 15th Conf. on USENIX Security Symposium, pp. 305\u2013320 (2006)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Stumpf, F., Eckert, C.: Enhancing trusted platform modules with hardware-based virtualization techniques. In: Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, pp. 1\u20139. IEEE (2008)","DOI":"10.1109\/SECURWARE.2008.23"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Danev, B., Masti, R., Karame, G., Capkun, S.: Enabling secure vm-vtpm migration in private clouds. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 187\u2013196. ACM (2011)","DOI":"10.1145\/2076732.2076759"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1535\/itj.1003.01","volume":"10","author":"G. Neiger","year":"2006","unstructured":"Neiger, G., Santoni, A., Leung, F., Dion Rodgers, R.U.: Intel virtualization technology: Hardware support for efficient processor virtualization. Intel Technology Journal\u00a010, 166\u2013177 (2006)","journal-title":"Intel Technology Journal"},{"key":"8_CR29","unstructured":"Advanced Micro Devices: Secure Virtual Machine Architecture Reference Manual Advanced Micro Devices (May 2005)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Robin, J.S., Irvine, C.E.: Analysis of the intel pentium\u2019s ability to support a secure virtual machine monitor. DTIC Document, Tech. Rep. (2000)","DOI":"10.21236\/ADA423654"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C., Anderson, A.V., Bennett, S.M., Kgi, A., Leung, F.H., Smith, L.: Intel virtualization technology, May 2005, pp. 48\u201356. IEEE Computer Society Press (2005)","DOI":"10.1109\/MC.2005.163"},{"issue":"5","key":"8_CR32","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1168917.1168860","volume":"40","author":"K. Adams","year":"2006","unstructured":"Adams, K., Agesen, O.: A comparison of software and hardware techniques for x86 virtualization. ACM SIGOPS Operating Systems Review\u00a040(5), 2\u201313 (2006)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"8_CR33","unstructured":"Ben-Yehuda, M., Mason, J., Xenidis, J., Krieger, O., Van Doorn, L., Nakajima, J., Mallick, A., Wahlig, E.: Utilizing iommus for virtualization in linux and xen. In: OLS 2006: The 2006 Ottawa Linux Symposium, pp. 71\u201386. Citeseer (2006)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:43:23Z","timestamp":1648255403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}