{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:21:13Z","timestamp":1740100873232,"version":"3.37.3"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9839069","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"5451-5456","source":"Crossref","is-referenced-by-count":1,"title":["Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform"],"prefix":"10.1109","author":[{"given":"Qihang","family":"Zhou","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Xiaoqi","family":"Jia","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Protecting cloud virtual machines from commodity hypervisor and host operating system exploits","author":"li","year":"2019","journal-title":"Usenix Security"},{"key":"ref11","article-title":"vtz: Virtualizing ARM trustzone","author":"hua","year":"2017","journal-title":"Usenix Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"year":"0","key":"ref13","article-title":"Armv8 white paper"},{"year":"2021","key":"ref14","article-title":"Arm trusted firmware"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694386"},{"article-title":"Trustzone: Integrated hardware and software security","year":"2004","author":"alves","key":"ref16"},{"year":"2021","key":"ref17","article-title":"Unixbench"},{"year":"2019","key":"ref18","article-title":"Iozone filesystem benchmark"},{"article-title":"Netperf","year":"2005","author":"team","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"ref4","article-title":"Copilot - a coprocessor-based kernel runtime integrity monitor","author":"p","year":"2004","journal-title":"Usenix Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"ref7","article-title":"Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks","author":"xia","year":"2013","journal-title":"HPCA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"ref9","article-title":"(mostly) exitless vm protection from untrusted vmm through disaggregated nested virtualization","author":"mi","year":"2020","journal-title":"Usenix Security"},{"year":"2021","key":"ref1","article-title":"The progress for cloud computing on arm architecture"},{"article-title":"cloc","year":"2020","author":"danial","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3140607.3050750"},{"key":"ref21","article-title":"Certikos: An extensible architecture for building certified concurrent OS kernels","author":"gu","year":"2016","journal-title":"OSDI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_9"},{"article-title":"Xen 0wning trilogy","year":"2008","author":"wojtczuk","key":"ref23"},{"key":"ref26","article-title":"Formally verified memory protection for a commodity multiprocessor hypervisor","author":"li","year":"2021","journal-title":"Usenix Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485956"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","start":{"date-parts":[[2022,5,16]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09839069.pdf?arnumber=9839069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:30:24Z","timestamp":1662409824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9839069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9839069","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}