{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:01Z","timestamp":1772163961799,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,3]],"date-time":"2012-03-03T00:00:00Z","timestamp":1330732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,3]]},"DOI":"10.1145\/2150976.2151022","type":"proceedings-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T08:18:26Z","timestamp":1331021906000},"page":"437-450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Architectural support for hypervisor-secure virtualization"],"prefix":"10.1145","author":[{"given":"Jakub","family":"Szefer","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2). http:\/\/aws.amazon.com\/ec2\/.  Amazon Elastic Compute Cloud (Amazon EC2). http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"AMD Virtualization (AMD-V) Technology. http:\/\/sites.amd.com\/us\/business\/it-solutions\/virtualization\/Pages\/amd-v.aspx.  AMD Virtualization (AMD-V) Technology. http:\/\/sites.amd.com\/us\/business\/it-solutions\/virtualization\/Pages\/amd-v.aspx."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel 82802AB\/82802AC Firmware Hub (FWH) datasheet November 2000. http:\/\/download.intel.com\/design\/chipsets\/datashts\/29065804.pdf.  Intel 82802AB\/82802AC Firmware Hub (FWH) datasheet November 2000. http:\/\/download.intel.com\/design\/chipsets\/datashts\/29065804.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel Corporation: Intel Virtualization Technology for Directed I\/O. http:\/\/download.intel.com\/technology\/itj\/2006\/v10i3\/v10-i3-art02.pdf.  Intel Corporation: Intel Virtualization Technology for Directed I\/O. http:\/\/download.intel.com\/technology\/itj\/2006\/v10i3\/v10-i3-art02.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel Virtualization Technology. http:\/\/www.intel.com\/technology\/itj\/2006\/v10i3\/1-hardware\/6-vt-x-vt-i-solutions.htm.  Intel Virtualization Technology. http:\/\/www.intel.com\/technology\/itj\/2006\/v10i3\/1-hardware\/6-vt-x-vt-i-solutions.htm."},{"key":"e_1_3_2_1_6_1","unstructured":"Introduction to the New Mainframe: z\/VM Basics section 1.9.2 and 2.4.1. IBM Redbooks http:\/\/www.redbooks.ibm.com\/abstracts\/sg247316.html.  Introduction to the New Mainframe: z\/VM Basics section 1.9.2 and 2.4.1. IBM Redbooks http:\/\/www.redbooks.ibm.com\/abstracts\/sg247316.html."},{"key":"e_1_3_2_1_7_1","unstructured":"National Vulnerability Database CVE and CCE Statistics Query Page. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics.  National Vulnerability Database CVE and CCE Statistics Query Page. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics."},{"key":"e_1_3_2_1_8_1","unstructured":"Oracle VM Server For SPARC. http:\/\/www.oracle.com\/us\/oraclevm-sparc-ds-073441.pdf.  Oracle VM Server For SPARC. http:\/\/www.oracle.com\/us\/oraclevm-sparc-ds-073441.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"PCI SIG: PCI-SIG Single Root I\/O Virtualization. http:\/\/www.pcisig.com\/specifications\/iov\/single_root\/.  PCI SIG: PCI-SIG Single Root I\/O Virtualization. http:\/\/www.pcisig.com\/specifications\/iov\/single_root\/."},{"key":"e_1_3_2_1_10_1","unstructured":"PolarSSL Small Cryptographic Library. http:\/\/www.polarssl.org.  PolarSSL Small Cryptographic Library. http:\/\/www.polarssl.org."},{"key":"e_1_3_2_1_11_1","unstructured":"Trusted Computing Group. TCG TPM Specification. http:\/\/www.trustedcomputinggroup.org\/.  Trusted Computing Group. TCG TPM Specification. http:\/\/www.trustedcomputinggroup.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"VMWare. http:\/\/www.vmware.com\/.  VMWare. http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Vulnerability Summary for CVE-2007--4993. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2007--4993.  Vulnerability Summary for CVE-2007--4993. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2007--4993."},{"key":"e_1_3_2_1_14_1","unstructured":"Xen. http:\/\/www.xen.org.  Xen. http:\/\/www.xen.org."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Proc. of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI","author":"Ben-Yehuda M.","year":"2010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876409"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133616"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01440-6_19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875667"},{"key":"e_1_3_2_1_27_1","unstructured":"G. Kroah-Hartman J. Corbet and A. McPherson. Linux kernel development. A White Paper By The Linux Foundation December 2010. www.linuxfoundation.org\/publications\/whowriteslinux.pdf.  G. Kroah-Hartman J. Corbet and A. McPherson. Linux kernel development. A White Paper By The Linux Foundation December 2010. www.linuxfoundation.org\/publications\/whowriteslinux.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2010.5521153"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_30_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-77535-5_8","volume-title":"S. Kim, M. Yung, and H.-W","author":"Lee Y.","year":"2007"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.29"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529733"},{"key":"e_1_3_2_1_34_1","volume-title":"Addison-Wesley Professional","author":"Maraia V.","year":"2005"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2049037"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_38_1","volume-title":"Subverting Vista Kernel for Fun and Profit. Symposium on Security for Asia Network (SyScan)","author":"Rutkowska J.","year":"2006"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.51"},{"key":"e_1_3_2_1_41_1","volume-title":"Black Hat USA","author":"Tereshkin A.","year":"2009"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875663"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844146"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"e_1_3_2_1_47_1","volume-title":"Black Hat DC","author":"Wojtczuk R.","year":"2009"}],"event":{"name":"ASPLOS'12: Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems","location":"London England, UK","acronym":"ASPLOS'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2151022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2150976.2151022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:54:44Z","timestamp":1750226084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2151022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,3]]},"references-count":47,"alternative-id":["10.1145\/2150976.2151022","10.1145\/2150976"],"URL":"https:\/\/doi.org\/10.1145\/2150976.2151022","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2248487.2151022","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2189750.2151022","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,3,3]]},"assertion":[{"value":"2012-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}