{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:44Z","timestamp":1772163944671,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1145\/1346281.1346284","type":"proceedings-article","created":{"date-parts":[[2008,3,12]],"date-time":"2008-03-12T18:35:48Z","timestamp":1205346948000},"page":"2-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":234,"title":["Overshadow"],"prefix":"10.1145","author":[{"given":"Xiaoxin","family":"Chen","sequence":"first","affiliation":[{"name":"VMware: Inc., Palo Alto, CA"}]},{"given":"Tal","family":"Garfinkel","sequence":"additional","affiliation":[{"name":"VMware: Inc., Palo Alto, CA"}]},{"given":"E. Christopher","family":"Lewis","sequence":"additional","affiliation":[{"name":"VMware: Inc., Palo Alto, CA"}]},{"given":"Pratap","family":"Subrahmanyam","sequence":"additional","affiliation":[{"name":"VMware: Inc., Palo Alto, CA"}]},{"given":"Carl A.","family":"Waldspurger","sequence":"additional","affiliation":[{"name":"VMware: Inc., Palo Alto, CA"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Jeffrey","family":"Dwoskin","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Dan R.K.","family":"Ports","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168860"},{"key":"e_1_3_2_2_2_1","volume-title":"May","author":"AMD.","year":"2005","unstructured":"AMD. AMD64 Virtualization Technology: Secure Virtual Machine Architecture Reference Manual , May 2005 . AMD. AMD64 Virtualization Technology: Secure Virtual Machine Architecture Reference Manual, May 2005."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266672"},{"key":"e_1_3_2_2_5_1","first-page":"273","volume-title":"Proceedings of the Second Symposium on Networked Systems Design and Implementation","author":"Clark C.","year":"2005","unstructured":"C. Clark , K. Fraser , S. Hand , J.G. Hansen , E. Jul , C. Limpach , I. Pratt , and A. Warfield . Live Migration of Virtual Machines . In Proceedings of the Second Symposium on Networked Systems Design and Implementation , pages 273 -- 286 , May 2005 . C. Clark, K. Fraser, S. Hand, J.G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live Migration of Virtual Machines. In Proceedings of the Second Symposium on Networked Systems Design and Implementation, pages 273--286, May 2005."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315294"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_2_9_1","first-page":"181","volume-title":"Proceedings of the Fourth Symposium on Operating Systems Design and Implementation","author":"Fu K.","year":"2000","unstructured":"K. Fu , M.F. Kaashoek , and D. Mazi\u00e8res . Fast and Secure Distributed Read-only File System . In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation , pages 181 -- 196 , October 2000 . K. Fu, M.F. Kaashoek, and D. Mazi\u00e8res. Fast and Secure Distributed Read-only File System. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, pages 181--196, October 2000."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_2_11_1","first-page":"131","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Goh E.-J.","year":"2003","unstructured":"E.-J. Goh , H. Shacham , N. Modadugu , and D. Boneh . SiRiUS: Securing Remote Untrusted Storage . In Proceedings of the Network and Distributed System Security Symposium , pages 131 -- 145 , February 2003 . E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing Remote Untrusted Storage. In Proceedings of the Network and Distributed System Security Symposium, pages 131--145, February 2003."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2005.1651218"},{"key":"e_1_3_2_2_13_1","volume-title":"November","year":"2006","unstructured":"Intel. Intel Trusted Execution Technology Preliminary Architecture Specification , November 2006 . Intel. Intel Trusted Execution Technology Preliminary Architecture Specification, November 2006."},{"key":"e_1_3_2_2_14_1","first-page":"1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Jones S.T.","year":"2006","unstructured":"S.T. Jones , A.C. Arpaci-Dusseau , and R.H. Arpaci-Dusseau . Antfarm: Tracking Processes in a Virtual Machine Environment . In Proceedings of the USENIX Annual Technical Conference , pages 1 -- 14 , June 2006 . S.T. Jones, A.C. Arpaci-Dusseau, and R.H. Arpaci-Dusseau. Antfarm: Tracking Processes in a Virtual Machine Environment. In Proceedings of the USENIX Annual Technical Conference, pages 1--14, June 2006."},{"key":"e_1_3_2_2_15_1","first-page":"104","volume-title":"Other Systems. In Proceedings of Crypto '96","author":"Kocher P.","year":"1996","unstructured":"P. Kocher . Timing Attacks on Implementations of Diffie-Hellman , RSA , DSS, and Other Systems. In Proceedings of Crypto '96 , pages 104 -- 113 , 1996 . P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proceedings of Crypto '96, pages 104--113, 1996."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_2_17_1","first-page":"121","volume-title":"Proceedings of the Sixth Symposium on Operating Systems Design and Implementation","author":"Li J.","year":"2004","unstructured":"J. Li , M.N. Krohn , D. Mazi\u00e8res , and D. Shasha . Secure Untrusted Data Repository (SUNDR) . In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation , pages 121 -- 136 , December 2004 . J. Li, M.N. Krohn, D. Mazi\u00e8res, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation, pages 121--136, December 2004."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_2_20_1","first-page":"135","volume-title":"Proceedings of the Fourth Symposium on Operating Systems Design and Implementation","author":"Maheshwari U.","year":"2000","unstructured":"U. Maheshwari , R. Vingralek , and W. Shapiro . How to Build a Trusted Database System on Untrusted Storage . In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation , pages 135 -- 150 , October 2000 . U. Maheshwari, R. Vingralek, and W. Shapiro. How to Build a Trusted Database System on Untrusted Storage. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, pages 135--150, October 2000."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.01"},{"key":"e_1_3_2_2_23_1","first-page":"391","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Nelson M.","year":"2005","unstructured":"M. Nelson , B.-H. Lim , and G. Hutchins . Fast Transparent Migration for Virtual Machines . In Proceedings of the USENIX Annual Technical Conference , pages 391 -- 394 , April 2005 . M. Nelson, B.-H. Lim, and G. Hutchins. Fast Transparent Migration for Virtual Machines. In Proceedings of the USENIX Annual Technical Conference, pages 391--394, April 2005."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1974.6323581"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/361268.361275"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_2_27_1","first-page":"222","volume-title":"Proceedings of the Twelfth International Symposium on High-Performance Computer Architecture","author":"Shi W.","year":"2006","unstructured":"W. Shi , J.B. Fryman , G. Gu , H.-H. Lee , Y. Zhang , and J. Yang . InfoShield: A Security Architecture for Protecting Information Usage in Memory . In Proceedings of the Twelfth International Symposium on High-Performance Computer Architecture , pages 222 -- 231 , February 2006 . W. Shi, J.B. Fryman, G. Gu, H.-H. Lee, Y. Zhang, and J. Yang. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In Proceedings of the Twelfth International Symposium on High-Performance Computer Architecture, pages 222--231, February 2006."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217951"},{"key":"e_1_3_2_2_29_1","first-page":"279","volume-title":"Proceedings of the Seventh Symposium on Operating Systems Design and Implementation","author":"Ta-Min R.","year":"2006","unstructured":"R. Ta-Min , L. Litty , and D. Lie . Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable . In Proceedings of the Seventh Symposium on Operating Systems Design and Implementation , pages 279 -- 292 , November 2006 . R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In Proceedings of the Seventh Symposium on Operating Systems Design and Implementation, pages 279--292, November 2006."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060307"}],"event":{"name":"ASPLOS08: Architectural Support for Programming Languages and Operating Systems","location":"Seattle WA USA","acronym":"ASPLOS08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 13th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1346281.1346284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:38:57Z","timestamp":1750239537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346284"}},"subtitle":["a virtualization-based approach to retrofitting protection in commodity operating systems"],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":30,"alternative-id":["10.1145\/1346281.1346284","10.1145\/1346281"],"URL":"https:\/\/doi.org\/10.1145\/1346281.1346284","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1353534.1346284","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353535.1346284","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353536.1346284","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}