{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:11Z","timestamp":1750307051445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T00:00:00Z","timestamp":1337040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,15]]},"DOI":"10.1145\/2212908.2212920","type":"proceedings-article","created":{"date-parts":[[2012,5,21]],"date-time":"2012-05-21T15:20:35Z","timestamp":1337613635000},"page":"75-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Architectural support of multiple hypervisors over single platform for enhancing cloud computing security"],"prefix":"10.1145","author":[{"given":"Weidong","family":"Shi","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"JongHyuk","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Taeweon","family":"Suh","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, South Korea"}]},{"given":"Dong Hyuk","family":"Woo","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei America R&amp;D Center, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3Leaf Systems. Next generation hybrid systems for hpc. http:\/\/www.3leafsystems.com\/download\/3leaf_wt_paper_Next_Gen_Hybrid_Sys\\%tems_for_HPC.pdf 2009.  3Leaf Systems. Next generation hybrid systems for hpc. http:\/\/www.3leafsystems.com\/download\/3leaf_wt_paper_Next_Gen_Hybrid_Sys\\%tems_for_HPC.pdf 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.02"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation","author":"Ben-Yehuda M.","year":"2010","unstructured":"Ben-Yehuda , M. , Day , M. D. , Dubitzky , Z. , Factor , M. , Har'El , N. , Gordon , A. , Liguori , A. , Wasserman , O. , and Yassour , B . -A. The turtles project: design and implementation of nested virtualization . In Proceedings of the 9th USENIX conference on Operating systems design and implementation ( Berkeley, CA, USA , 2010 ), OSDI'10, USENIX Association, pp. 1--6. Ben-Yehuda, M., Day, M. D., Dubitzky, Z., Factor, M., Har'El, N., Gordon, A., Liguori, A., Wasserman, O., and Yassour, B.-A. The turtles project: design and implementation of nested virtualization. In Proceedings of the 9th USENIX conference on Operating systems design and implementation (Berkeley, CA, USA, 2010), OSDI'10, USENIX Association, pp. 1--6."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274971.1275005"},{"key":"e_1_3_2_1_7_1","first-page":"5","author":"Ferrie P.","year":"2006","unstructured":"Ferrie , P. Attacks on virtual machine emulators. Symantec Security Response 5 ( 2006 ). Ferrie, P. Attacks on virtual machine emulators. Symantec Security Response 5 (2006).","journal-title":"Symantec Security Response"},{"key":"e_1_3_2_1_8_1","volume-title":"An empirical study into the security exposure to hosts of hostile virtualized environments","author":"Frank Gens P","year":"2007","unstructured":"Frank Gens , Robert P Mahowald , R. L. V. An empirical study into the security exposure to hosts of hostile virtualized environments , 2007 . Frank Gens, Robert P Mahowald, R. L. V. An empirical study into the security exposure to hosts of hostile virtualized environments, 2007."},{"key":"e_1_3_2_1_9_1","volume-title":"TIK Report Nr. 82, Computing Engineering and Networks Lab (TIK)","author":"Gries M.","year":"1999","unstructured":"Gries , M. , and Romer ., A. Performance Evaluation of Recent DRAM Architectures for Embedded Systems . In TIK Report Nr. 82, Computing Engineering and Networks Lab (TIK) , Swiss Federal Institute of Technology (ETH) Zurich (November 1999 ). Gries, M., and Romer., A. Performance Evaluation of Recent DRAM Architectures for Embedded Systems. In TIK Report Nr. 82, Computing Engineering and Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich (November 1999)."},{"key":"e_1_3_2_1_10_1","unstructured":"Heiser J. and Nicolett M. Assessing the security risks of cloud computing. http:\/\/www.gartner.com\/DisplayDocument?id=685308 2009.  Heiser J. and Nicolett M. Assessing the security risks of cloud computing. http:\/\/www.gartner.com\/DisplayDocument?id=685308 2009."},{"key":"e_1_3_2_1_11_1","unstructured":"Held J. Bautista J. and Koehl S. White paper from a few cores to many: A tera-scale computing research review.  Held J. Bautista J. and Koehl S. White paper from a few cores to many: A tera-scale computing research review."},{"key":"e_1_3_2_1_12_1","unstructured":"K. Lawton. Welcome to the Bochs x86 PC Emulation Software Home Page. http:\/\/www.bochs.com.  K. Lawton. Welcome to the Bochs x86 PC Emulation Software Home Page. http:\/\/www.bochs.com."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.119"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_16_1","volume-title":"Black Hat USA","author":"Kortchinsky K.","year":"2009","unstructured":"Kortchinsky , K. Cloudburst -- hacking 3D and breaking out of VMware . In Black Hat USA ( 2009 ). Kortchinsky, K. Cloudburst -- hacking 3D and breaking out of VMware. In Black Hat USA (2009)."},{"key":"e_1_3_2_1_17_1","unstructured":"Mell P. Nist presentation on effectively and securely using the cloud computing paradigm v26. http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/index.html 2009.  Mell P. Nist presentation on effectively and securely using the cloud computing paradigm v26. http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/index.html 2009."},{"key":"e_1_3_2_1_18_1","first-page":"18","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"Moscibroda T.","year":"2007","unstructured":"Moscibroda , T. , and Mutlu , O . Memory performance attacks: Denial of memory service in multi-core systems . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium ( 2007 ), USENIX Association , p. 18 . Moscibroda, T., and Mutlu, O. Memory performance attacks: Denial of memory service in multi-core systems. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007), USENIX Association, p. 18."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.01"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.24"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250671"},{"key":"e_1_3_2_1_22_1","volume-title":"CanSecWest","author":"Ormandy T.","year":"2007","unstructured":"Ormandy , T. An empirical study into the security exposure to hosts of hostile virtualized environments . In CanSecWest ( 2007 ). Ormandy, T. An empirical study into the security exposure to hosts of hostile virtualized environments. In CanSecWest (2007)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_24_1","volume-title":"Black Hat USA","author":"Rutkowska J.","year":"2006","unstructured":"Rutkowska , J. Blue pill . In Black Hat USA ( 2006 ). Rutkowska, J. Blue pill. In Black Hat USA (2006)."},{"key":"e_1_3_2_1_25_1","unstructured":"Secunia. Advisory sa37081 - VMware ESX sever uodate for DHCP kernel and JRE. http:\/\/secunia.com\/advisories\/37081\/.  Secunia. Advisory sa37081 - VMware ESX sever uodate for DHCP kernel and JRE. http:\/\/secunia.com\/advisories\/37081\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.502236"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1003.f"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/846216.846957"},{"key":"e_1_3_2_1_30_1","volume-title":"Black Hat USA","author":"Wojtczuk R.","year":"2008","unstructured":"Wojtczuk , R. Subverting the Xen hypervisor . In Black Hat USA ( 2008 ). Wojtczuk, R. Subverting the Xen hypervisor. In Black Hat USA (2008)."},{"key":"e_1_3_2_1_31_1","volume-title":"Workshop on Chip Multiprocessor Memory Systems and Interconnects","author":"Woo D. H.","year":"2007","unstructured":"v Woo , D. H. , and Lee , H . -H. Analyzing performance vulnerability due to resource denial of service attack on chip multiprocessors . In Workshop on Chip Multiprocessor Memory Systems and Interconnects ( 2007 ). vWoo, D. H., and Lee, H.-H. Analyzing performance vulnerability due to resource denial of service attack on chip multiprocessors. In Workshop on Chip Multiprocessor Memory Systems and Interconnects (2007)."}],"event":{"name":"CF'12: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Cagliari Italy","acronym":"CF'12"},"container-title":["Proceedings of the 9th conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2212908.2212920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2212908.2212920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:07Z","timestamp":1750238467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2212908.2212920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,15]]},"references-count":31,"alternative-id":["10.1145\/2212908.2212920","10.1145\/2212908"],"URL":"https:\/\/doi.org\/10.1145\/2212908.2212920","relation":{},"subject":[],"published":{"date-parts":[[2012,5,15]]},"assertion":[{"value":"2012-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}