{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:56Z","timestamp":1763154116859,"version":"3.45.0"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3597103","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T18:43:05Z","timestamp":1754678585000},"page":"7448-7462","source":"Crossref","is-referenced-by-count":0,"title":["COSMOS: A Fault Injection Framework to Assess Hardware-Assisted Hypervisors"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-8614","authenticated-orcid":false,"given":"Marcello","family":"Cinque","sequence":"first","affiliation":[{"name":"DIETI - Universit&#x00E0; degli Studi di Napoli Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7103-592X","authenticated-orcid":false,"given":"Domenico","family":"Cotroneo","sequence":"additional","affiliation":[{"name":"DIETI - Universit&#x00E0; degli Studi di Napoli Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6621-6181","authenticated-orcid":false,"given":"Giuseppe","family":"De Rosa","sequence":"additional","affiliation":[{"name":"DIETI - Universit&#x00E0; degli Studi di Napoli Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6008-2656","authenticated-orcid":false,"given":"Luigi","family":"De Simone","sequence":"additional","affiliation":[{"name":"DIETI - Universit&#x00E0; degli Studi di Napoli Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2612-9884","authenticated-orcid":false,"given":"Giorgio","family":"Farina","sequence":"additional","affiliation":[{"name":"DIETI - Universit&#x00E0; degli Studi di Napoli Federico II, Napoli, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2015.150014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.12.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3264825"},{"year":"2025","key":"ref4","article-title":"Enabling Linux in safety applications (ELISA)"},{"year":"2025","key":"ref5","article-title":"Gartner says more than half of enterprise IT spending in key market segments will shift to the cloud by 2025"},{"year":"2025","key":"ref6","article-title":"Huge cloud market still growing at 34% per year; amazon, microsoft & google now account for 65% of the total"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465297"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.62"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.50"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056044"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00065"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Cluster48925.2021.00060"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00035"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST52088.2021.9493360"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670986"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2973146"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2023.3306617"},{"year":"2025","key":"ref18","article-title":"AmazonAWS user guide"},{"year":"2025","key":"ref19","article-title":"Google cloud platform FAQ"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.01"},{"year":"2025","key":"ref21","article-title":"AMD64 architecture programmer\u2019s manual volume 2: System Programming"},{"year":"2025","key":"ref22","article-title":"Arm architecture reference manual for a-profile architecture"},{"year":"2025","key":"ref23","article-title":"Intel 64 and IA-32 architectures software developer manuals"},{"year":"2025","key":"ref24","article-title":"Xen project commit 9d89100"},{"year":"2025","key":"ref25","article-title":"Linux KVM commit b00471a"},{"year":"2025","key":"ref26","article-title":"Linux KVM commit f5a81d0"},{"year":"2025","key":"ref27","article-title":"CVE-2020-2732"},{"year":"2025","key":"ref28","article-title":"CVE-2010-0435"},{"year":"2025","key":"ref29","article-title":"CVE-2011-1936"},{"key":"ref30","first-page":"225","article-title":"KVM: The linux virtual machine monitor","volume-title":"Proc. Linux Symp.","author":"Kivity"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334300"},{"key":"ref32","first-page":"7","article-title":"Understanding reliability implication of hardware error in virtualization infrastructure","volume-title":"Proc. 10th Workshop Hot Topics Syst. Dependability","author":"Xu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2560817"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958218"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2841425"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952692"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334300"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/dsnw.2012.6264691"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"year":"2025","key":"ref42","article-title":"Jailhouse hypervisor source code"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.30"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3043023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"article-title":"Intel 64 and IA-32 architectures software developer\u2019s manual volume 3 (3A, 3B, 3 C & 3D): System programming guide","year":"2023","author":"Intel","key":"ref47"},{"key":"ref48","first-page":"423","article-title":"The turtles project: Design and implementation of nested virtualization","volume-title":"Proc. 9th USENIX Conf. Operating Syst. Des. Implementation","author":"Ben-Yehuda"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484748"},{"year":"2025","key":"ref50","article-title":"Error handling in xen"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.03.004"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00024"},{"year":"2025","key":"ref53","article-title":"Xen security issue prompts amazon, rackspace cloud reboots"},{"year":"2025","key":"ref57","article-title":"Hyper-v technology overview"},{"key":"ref58","first-page":"2597","article-title":"Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types","volume-title":"Proc. USENIX Secur. Symp.","author":"Schumilo"},{"article-title":"FATE and DESTINI: A framework for cloud recovery testing","volume-title":"Proc. 8th USENIX Conf. Netw. Syst. Des. Implementation","author":"Gunawi","key":"ref59"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048082"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523622"},{"year":"2025","key":"ref62","article-title":"The chaos monkey"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.26"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2575829"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom2018.2018.00048"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11121437.pdf?arnumber=11121437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:00:49Z","timestamp":1763154049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11121437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":61,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3597103","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}