{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T22:27:25Z","timestamp":1768429645281,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T00:00:00Z","timestamp":1334016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,10]]},"DOI":"10.1145\/2168836.2168850","type":"proceedings-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:38Z","timestamp":1334060378000},"page":"127-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Isolating commodity hosted hypervisors with HyperLock"],"prefix":"10.1145","author":[{"given":"Zhi","family":"Wang","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Chiachih","family":"Wu","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Michael","family":"Grace","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kernel Samepage Merging. http:\/\/lwn.net\/Articles\/330589\/.  Kernel Samepage Merging. http:\/\/lwn.net\/Articles\/330589\/."},{"key":"e_1_3_2_1_2_1","unstructured":"WAX. http:\/\/en.wikipedia.org\/wiki\/WAX.  WAX. http:\/\/en.wikipedia.org\/wiki\/WAX."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (October","author":"Ben-Yehuda M.","year":"2010","unstructured":"Ben-Yehuda , M. , Day , M. D. , Dubitzky , Z. , Factor , M. , Har'El , N. , Gordon , A. , Liguori , A. , Wasserman , O. , and Yassour , B . -A. The Turtles Project: Design and Implementation of Nested Virtualization . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (October 2010 ). Ben-Yehuda, M., Day, M. D., Dubitzky, Z., Factor, M., Har'El, N., Gordon, A., Liguori, A., Wasserman, O., and Yassour, B.-A. The Turtles Project: Design and Implementation of Nested Virtualization. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (October 2010)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855840.1855849"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_9_1","unstructured":"Coker R. Bonnie++. http:\/\/www.coker.com.au\/bonnie++\/.  Coker R. Bonnie++. http:\/\/www.coker.com.au\/bonnie++\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043575"},{"key":"e_1_3_2_1_11_1","unstructured":"Corbet J. Memory Management Notifiers. http:\/\/lwn.net\/Articles\/266320\/.  Corbet J. Memory Management Notifiers. http:\/\/lwn.net\/Articles\/266320\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Elhage N. Virtualization Under Attack: Breaking out of KVM. http:\/\/www.blackhat.com\/html\/bh-us-11\/bh-us-11-briefings.html.  Elhage N. Virtualization Under Attack: Breaking out of KVM. http:\/\/www.blackhat.com\/html\/bh-us-11\/bh-us-11-briefings.html."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (November","author":"Erlingsson U.","year":"2006","unstructured":"Erlingsson , U. , Valley , S. , Abadi , M. , Vrable , M. , Budiu , M. , and Necula , G. C . XFI: Software Guards for System Address Spaces . In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (November 2006 ). Erlingsson, U., Valley, S., Abadi, M., Vrable, M., Budiu, M., and Necula, G. C. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (November 2006)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of 2008 USENIX Annual Technical Conference (June","author":"Ford B.","year":"2008","unstructured":"Ford , B. , and Cox , R . Vx32: Lightweight User-level Sandboxing on the x86 . In Proceedings of 2008 USENIX Annual Technical Conference (June 2008 ). Ford, B., and Cox, R. Vx32: Lightweight User-level Sandboxing on the x86. In Proceedings of 2008 USENIX Annual Technical Conference (June 2008)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346303"},{"key":"e_1_3_2_1_16_1","volume-title":"T. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proceedings of the 20th Annual Network and Distributed Systems Security Symposium (February","author":"Garfinkel","year":"2003","unstructured":"Garfinkel , T. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proceedings of the 20th Annual Network and Distributed Systems Security Symposium (February 2003 ). Garfinkel, T. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proceedings of the 20th Annual Network and Distributed Systems Security Symposium (February 2003)."},{"key":"e_1_3_2_1_17_1","volume-title":"Nesting the Virtualized World. Linux Plumbers Conference","author":"Graf A.","year":"2009","unstructured":"Graf , A. , and Roedel , J . Nesting the Virtualized World. Linux Plumbers Conference , September 2009 . Graf, A., and Roedel, J. Nesting the Virtualized World. Linux Plumbers Conference, September 2009."},{"key":"e_1_3_2_1_18_1","first-page":"2","author":"Intel","year":"2010","unstructured":"Intel . Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3: System Programming Guide, Part 1 and Part 2 , 2010 . Intel. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3: System Programming Guide, Part 1 and Part 2, 2010.","journal-title":"Part"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2007 Ottawa Linux Symposium (June","author":"Kivity A.","year":"2007","unstructured":"Kivity , A. , Kamay , Y. , Laor , D. , Lublin , U. , and Liguori , A . kvm: the Linux Virtual Machine Monitor . In Proceedings of the 2007 Ottawa Linux Symposium (June 2007 ). Kivity, A., Kamay, Y., Laor, D., Lublin, U., and Liguori, A. kvm: the Linux Virtual Machine Monitor. In Proceedings of the 2007 Ottawa Linux Symposium (June 2007)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_21_1","unstructured":"Kortchinsky K. CLOUDBURST: A VMware Guest to Host Escape Story. http:\/\/www.blackhat.com\/presentations\/bh-usa-09\/KORTCHINSKY\/BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdf.  Kortchinsky K. CLOUDBURST: A VMware Guest to Host Escape Story. http:\/\/www.blackhat.com\/presentations\/bh-usa-09\/KORTCHINSKY\/BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdf."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043568"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267351"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"e_1_3_2_1_25_1","unstructured":"National Vulnerability Database. http:\/\/nvd.nist.gov\/.  National Vulnerability Database. http:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518684.1518688"},{"key":"e_1_3_2_1_27_1","volume-title":"N. Improving Host Security with System Call Policies. In Proceedings of the 12th Usenix Security Symposium (August","author":"Provos","year":"2002","unstructured":"Provos , N. Improving Host Security with System Call Policies. In Proceedings of the 12th Usenix Security Symposium (August 2002 ). Provos, N. Improving Host Security with System Call Policies. In Proceedings of the 12th Usenix Security Symposium (August 2002)."},{"key":"e_1_3_2_1_28_1","unstructured":"red hat. KVM: Kernel-based Virtual Machine. www.redhat.com\/f\/pdf\/rhev\/DOC-KVM.pdf.  red hat. KVM: Kernel-based Virtual Machine. www.redhat.com\/f\/pdf\/rhev\/DOC-KVM.pdf."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400108"},{"key":"e_1_3_2_1_30_1","unstructured":"Rutkowska J. On Formally Verified Microkernels (and on attacking them). http:\/\/theinvisiblethings.blogspot.com\/2010\/05\/on-formally-verified-microkernels-and.html.  Rutkowska J. On Formally Verified Microkernels (and on attacking them). http:\/\/theinvisiblethings.blogspot.com\/2010\/05\/on-formally-verified-microkernels-and.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653720"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium (February","author":"Srivastava A.","year":"2011","unstructured":"Srivastava , A. , and Giffin , J . Efficient Monitoring of Untrusted Kernel-Mode Execution . In Proceedings of the 18th Annual Network and Distributed System Security Symposium (February 2011 ). Srivastava, A., and Giffin, J. Efficient Monitoring of Untrusted Kernel-Mode Execution. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (February 2011)."},{"key":"e_1_3_2_1_33_1","volume-title":"Performance Evaluation Corporation. SPEC CPU2006","author":"Standard","year":"2006","unstructured":"Standard Performance Evaluation Corporation. SPEC CPU2006 . http:\/\/www.spec.org\/cpu 2006 . Standard Performance Evaluation Corporation. SPEC CPU2006. http:\/\/www.spec.org\/cpu2006."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945466"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"e_1_3_2_1_37_1","unstructured":"VMware. Timekeeping in VMware Virtual Machines. http:\/\/www.vmware.com\/files\/pdf\/Timekeeping-In-VirtualMachines.pdf.  VMware. Timekeeping in VMware Virtual Machines. http:\/\/www.vmware.com\/files\/pdf\/Timekeeping-In-VirtualMachines.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 19th USENIX Security Symposium (August","author":"Watson R. N. M.","year":"2010","unstructured":"Watson , R. N. M. , Anderson , J. , Laurie , B. , and Kennaway , K . Capsicum: Practical Capabilities for UNIX . In Proceedings of the 19th USENIX Security Symposium (August 2010 ). Watson, R. N. M., Anderson, J., Laurie, B., and Kennaway, K. Capsicum: Practical Capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium (August 2010)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855758"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium (February","author":"Xiong X.","year":"2011","unstructured":"Xiong , X. , Tian , D. , and Liu , P . Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions . In Proceedings of the 18th Annual Network and Distributed System Security Symposium (February 2011 ). Xiong, X., Tian, D., and Liu, P. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (February 2011)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"EuroSys '12: Seventh EuroSys Conference 2012","location":"Bern Switzerland","acronym":"EuroSys '12","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 7th ACM european conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2168836.2168850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2168836.2168850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2168836.2168850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,10]]},"references-count":43,"alternative-id":["10.1145\/2168836.2168850","10.1145\/2168836"],"URL":"https:\/\/doi.org\/10.1145\/2168836.2168850","relation":{},"subject":[],"published":{"date-parts":[[2012,4,10]]},"assertion":[{"value":"2012-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}