{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:05:15Z","timestamp":1778789115838,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["9.08E+15"],"award-info":[{"award-number":["9.08E+15"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["10511500100"],"award-info":[{"award-number":["10511500100"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Leading Academic Discipline Project","award":["B114"],"award-info":[{"award-number":["B114"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043576","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"203-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":259,"title":["CloudVisor"],"prefix":"10.1145","author":[{"given":"Fengzhe","family":"Zhang","sequence":"first","affiliation":[{"name":"Fudan University"}]},{"given":"Jin","family":"Chen","sequence":"additional","affiliation":[{"name":"Fudan University"}]},{"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Fudan University"}]},{"given":"Binyu","family":"Zang","sequence":"additional","affiliation":[{"name":"Fudan University"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitlocker drive encryption technical overview. http:\/\/technet.microsoft.com\/en-us\/library\/cc766200%28WS.10%29.aspx.  Bitlocker drive encryption technical overview. http:\/\/technet.microsoft.com\/en-us\/library\/cc766200%28WS.10%29.aspx."},{"key":"e_1_3_2_1_2_1","unstructured":"Common vulnerabilities and exposures. http:\/\/cve.mitre.org\/.  Common vulnerabilities and exposures. http:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Filevault in mac osx. http:\/\/www.apple.com\/macosx\/whats-new\/features.html#filevault2.  Filevault in mac osx. http:\/\/www.apple.com\/macosx\/whats-new\/features.html#filevault2."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel advanced encryption standard instructions (aes-ni). http:\/\/software.intel.com\/en-us\/articles\/intel-advanced-encryption-standard-instructions-aes-ni\/ 2010.  Intel advanced encryption standard instructions (aes-ni). http:\/\/software.intel.com\/en-us\/articles\/intel-advanced-encryption-standard-instructions-aes-ni\/ 2010."},{"key":"e_1_3_2_1_5_1","unstructured":"D. Abramson J. Jackson S. Muthrasanallur G. Neiger G. Regnier R. Sankaran I. Schoinas R. Uhlig B. Vembu and J. Wiegert. Intel virtualization technology for directed I\/O. Intel technology journal 10(3):179--192 2006.  D. Abramson J. Jackson S. Muthrasanallur G. Neiger G. Regnier R. Sankaran I. Schoinas R. Uhlig B. Vembu and J. Wiegert. Intel virtualization technology for directed I\/O. Intel technology journal 10(3):179--192 2006."},{"key":"e_1_3_2_1_6_1","unstructured":"Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2). http:\/\/aws.amazon.com\/ec2\/ 2011.  Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2). http:\/\/aws.amazon.com\/ec2\/ 2011."},{"key":"e_1_3_2_1_7_1","unstructured":"Amazon Inc. Amazon machine image. http:\/\/aws.amazon.com\/amis 2011.  Amazon Inc. Amazon machine image. http:\/\/aws.amazon.com\/amis 2011."},{"key":"e_1_3_2_1_8_1","unstructured":"Amazon Inc. Amazon web service customer agreement. http:\/\/aws.amazon.com\/agreement\/ 2011.  Amazon Inc. Amazon web service customer agreement. http:\/\/aws.amazon.com\/agreement\/ 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"AMD Inc. Secure virtual machine architecture reference manual 2005.  AMD Inc. Secure virtual machine architecture reference manual 2005."},{"key":"e_1_3_2_1_10_1","unstructured":"Apache. ab - apache http server benchmarking tool. http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html 2011.  Apache. ab - apache http server benchmarking tool. http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. OSDI","author":"Ben-Yehuda M.","year":"2010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2007.05.005"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. HotOS","author":"Chen P.","year":"2001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. Workshop on I\/O virtualization. USENIX","author":"Dong Y.","year":"2008"},{"key":"e_1_3_2_1_19_1","unstructured":"B. Fitzpatrick. Distributed caching with memcached. Linux journal 2004.   B. Fitzpatrick. Distributed caching with memcached. Linux journal 2004."},{"key":"e_1_3_2_1_20_1","unstructured":"Flexiant Inc. Flexiscale public cloud. http:\/\/www.flexiant.com\/products\/flexiscale\/.  Flexiant Inc. Flexiscale public cloud. http:\/\/www.flexiant.com\/products\/flexiscale\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945464"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. HotOS","author":"Garfinkel T.","year":"2005"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/800122.803950"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1974.6323581"},{"key":"e_1_3_2_1_25_1","first-page":"309","volume-title":"Proc. OSDI","author":"Gupta D.","year":"2008"},{"key":"e_1_3_2_1_26_1","unstructured":"J. Heiser and M. Nicolett. Assessing the security risks of cloud computing. http:\/\/www.gartner.com\/DisplayDocument?id=685308 2008.  J. Heiser and M. Nicolett. Assessing the security risks of cloud computing. http:\/\/www.gartner.com\/DisplayDocument?id=685308 2008."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel Inc. Intel trusted execution technology. www.intel.com\/technology\/security\/ 2010.  Intel Inc. Intel trusted execution technology. www.intel.com\/technology\/security\/ 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592438"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776450"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_33_1","volume-title":"Linux Symposium","author":"Kivity A.","year":"2007"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. HotOS","author":"Krohn M.","year":"2005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.27"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. Usenix ATC","author":"McVoy L.","year":"1996"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. Usenix ATC","author":"Mil\u00f3s G.","year":"2009"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.01"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.93"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_8"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433008"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_50_1","unstructured":"J. Rutkowska. Introducing Blue Pill. The official blog of the invisiblethings. org. June 22 2006.  J. Rutkowska. Introducing Blue Pill. The official blog of the invisiblethings. org. June 22 2006."},{"key":"e_1_3_2_1_51_1","volume-title":"Black Hat USA","author":"Rutkowska J.","year":"2008"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. USENIX Security","author":"Sailer R.","year":"2004"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958812"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508311"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217951"},{"key":"e_1_3_2_1_59_1","unstructured":"SPEC. Specjbb 2005. http:\/\/www.spec.org\/jbb2005\/ 2005.  SPEC. Specjbb 2005. http:\/\/www.spec.org\/jbb2005\/ 2005."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_62_1","unstructured":"T. R. Team. Rackspace cloud. http:\/\/www.rackspacecloud.com\/.  T. R. Team. Rackspace cloud. http:\/\/www.rackspacecloud.com\/."},{"key":"e_1_3_2_1_63_1","unstructured":"TechSpot News. Google fired employees for breaching user privacy. http:\/\/www.techspot.com\/news\/40280-google-fired-employees-for-breaching-user-privacy.html 2010.  TechSpot News. Google fired employees for breaching user privacy. http:\/\/www.techspot.com\/news\/40280-google-fired-employees-for-breaching-user-privacy.html 2010."},{"key":"e_1_3_2_1_64_1","unstructured":"The Nimbus Team. Nimbus project. http:\/\/www.nimbusproject.org\/.  The Nimbus Team. Nimbus project. http:\/\/www.nimbusproject.org\/."},{"key":"e_1_3_2_1_65_1","unstructured":"A. Tridgell. Dbench filesystem benchmark. http:\/\/samba.org\/ftp\/tridge\/dbench\/.  A. Tridgell. Dbench filesystem benchmark. http:\/\/samba.org\/ftp\/tridge\/dbench\/."},{"key":"e_1_3_2_1_66_1","unstructured":"Trusted Computing Group. Trusted platform module. http:\/\/www.trustedcomputinggroup.org\/ 2010.  Trusted Computing Group. Trusted platform module. http:\/\/www.trustedcomputinggroup.org\/ 2010."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060307"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"key":"e_1_3_2_1_70_1","volume-title":"Proc. Usenix ATC","author":"Weinhold C.","year":"2011"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"e_1_3_2_1_72_1","first-page":"225","volume-title":"Proc. OSDI","author":"Zeldovich N.","year":"2008"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043576"}},"subtitle":["retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization"],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":71,"alternative-id":["10.1145\/2043556.2043576","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043576","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}