{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:40Z","timestamp":1750306780740,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1100221, IIP-1342663, CNS-0905131"],"award-info":[{"award-number":["CNS-1100221, IIP-1342663, CNS-0905131"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0525 (MURI)"],"award-info":[{"award-number":["W911NF-09-1-0525 (MURI)"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000151","name":"Division of Industrial Innovation and Partnerships","doi-asserted-by":"publisher","award":["CNS-1100221, IIP-1342663, CNS-0905131"],"award-info":[{"award-number":["CNS-1100221, IIP-1342663, CNS-0905131"]}],"id":[{"id":"10.13039\/100000151","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["W911F1210055"],"award-info":[{"award-number":["W911F1210055"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523680","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"59-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["MyCloud"],"prefix":"10.1145","author":[{"given":"Min","family":"Li","sequence":"first","affiliation":[{"name":"Virginia Commonwealth University"}]},{"given":"Wanyu","family":"Zang","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University"}]},{"given":"Kun","family":"Bai","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"compilebench. https:\/\/oss.oracle.com\/-mason\/compilebench\/.  compilebench. https:\/\/oss.oracle.com\/-mason\/compilebench\/."},{"key":"e_1_3_2_1_2_1","unstructured":"xenaccess. http:\/\/doc.xenaccess.org\/.  xenaccess. http:\/\/doc.xenaccess.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Advanced Micro Devices. AMD I\/O Virtualization Technology (IOMMU) Specification February 2009.  Advanced Micro Devices. AMD I\/O Virtualization Technology (IOMMU) Specification February 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"December","author":"Devices Advanced Micro","year":"2011","unstructured":"Advanced Micro Devices . AMD64 Architecture Programmer's Manual Volume 2: System Programming , December 2011 . Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, December 2011."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of the second Usenix workshop on electronic commerce","volume":"2","author":"Anderson R.","year":"1996","unstructured":"R. Anderson and M. Kuhn . Tamper resistance-a cautionary note . In Proceedings of the second Usenix workshop on electronic commerce , volume 2 , pages 1 -- 11 , 1996 . R. Anderson and M. Kuhn. Tamper resistance-a cautionary note. In Proceedings of the second Usenix workshop on electronic commerce, volume 2, pages 1--11, 1996."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046752"},{"key":"e_1_3_2_1_7_1","volume-title":"Sony PlayStation Network attack shows Amazon EC2 a hackers' paradise","author":"Bagh C.","year":"2011","unstructured":"C. Bagh . Sony PlayStation Network attack shows Amazon EC2 a hackers' paradise , 2011 . http:\/\/www. ibtimes.com\/articles\/146224\/20110516\/. C. Bagh. Sony PlayStation Network attack shows Amazon EC2 a hackers' paradise, 2011. http:\/\/www. ibtimes.com\/articles\/146224\/20110516\/."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation","author":"Ben-Yehuda M.","year":"2010","unstructured":"M. Ben-Yehuda , M. Day , Z. Dubitzky , M. Factor , N. Har'El , A. Gordon , A. Liguori , O. Wasserman , and B. Yassour . The turtles project: Design and implementation of nested virtualization . In Proceedings of the 9th USENIX conference on Operating systems design and implementation , pages 1 -- 6 . USENIX Association , 2010 . M. Ben-Yehuda, M. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B. Yassour. The turtles project: Design and implementation of nested virtualization. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1--6. USENIX Association, 2010."},{"issue":"92","key":"e_1_3_2_1_9_1","first-page":"7","article-title":"About linuxbios","volume":"2001","author":"Biederman E.","unstructured":"E. Biederman . Kernel korner : About linuxbios . Linux J. , 2001 ( 92 ): 7 --, Dec. 2001. E. Biederman. Kernel korner: About linuxbios. Linux J., 2001(92):7--, Dec. 2001.","journal-title":"Linux J."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414505"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090264"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382226"},{"key":"e_1_3_2_1_13_1","first-page":"260","volume-title":"Advanced Communication Technology (ICACT), 2011 13th International Conference on","author":"Chuang I.-H.","year":"2011","unstructured":"I.-H. Chuang , S.-H. Li , K.-C. Huang , and Y.-H. Kuo . An effective privacy protection scheme for cloud computing . In Advanced Communication Technology (ICACT), 2011 13th International Conference on , pages 260 -- 265 , feb. 2011 . I.-H. Chuang, S.-H. Li, K.-C. Huang, and Y.-H. Kuo. An effective privacy protection scheme for cloud computing. In Advanced Communication Technology (ICACT), 2011 13th International Conference on, pages 260--265, feb. 2011."},{"key":"e_1_3_2_1_14_1","unstructured":"Coreboot. http:\/\/www. coreboot. org.  Coreboot. http:\/\/www. coreboot. org."},{"key":"e_1_3_2_1_15_1","unstructured":"CVE-2007-4993. Xen guest root escape to dom0 via pygrub.  CVE-2007-4993. Xen guest root escape to dom0 via pygrub."},{"key":"e_1_3_2_1_16_1","unstructured":"CVE-2009-1244. Vulnerability in the virtual machine display function in vmware workstation allows guest os users to execute arbitrary code on host os.  CVE-2009-1244. Vulnerability in the virtual machine display function in vmware workstation allows guest os users to execute arbitrary code on host os."},{"key":"e_1_3_2_1_17_1","unstructured":"CVE-2009-1758. The hypervisor callback function in xen as applied to the linux kernel 2.6.30-rc4 allows guest user applications to cause a denial of service of the guest os by triggering a segmentation fault in certain address ranges.  CVE-2009-1758. The hypervisor callback function in xen as applied to the linux kernel 2.6.30-rc4 allows guest user applications to cause a denial of service of the guest os by triggering a segmentation fault in certain address ranges."},{"key":"e_1_3_2_1_18_1","unstructured":"CVE-2009-2277. Cross-site scripting (xss) vulnerability in webaccess in vmware allows attackers to inject arbitrary web script via vectors related to context data.  CVE-2009-2277. Cross-site scripting (xss) vulnerability in webaccess in vmware allows attackers to inject arbitrary web script via vectors related to context data."},{"key":"e_1_3_2_1_19_1","unstructured":"CVE-2010-0431. Qemu-kvm in redhat enterprise virtualization (rhev) 2.2 and kvm 83 does not properly validate guest qxl driver pointers which allows guest os users to gain privileges via unspecified vectors.  CVE-2010-0431. Qemu-kvm in redhat enterprise virtualization (rhev) 2.2 and kvm 83 does not properly validate guest qxl driver pointers which allows guest os users to gain privileges via unspecified vectors."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"e_1_3_2_1_21_1","unstructured":"EC2. http:\/\/aws.amazon.com\/ec2\/.  EC2. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Virtunoid: Breaking out of kvm","author":"Elhage N.","year":"2011","unstructured":"N. Elhage . Virtunoid: Breaking out of kvm , 2011 . N. Elhage. Virtunoid: Breaking out of kvm, 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945464"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel , M. Rosenblum , A virtual machine introspection based architecture for intrusion detection . In Proc. Network and Distributed Systems Security Symposium , 2003 . T. Garfinkel, M. Rosenblum, et al. A virtual machine introspection based architecture for intrusion detection. In Proc. Network and Distributed Systems Security Symposium, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113363"},{"key":"e_1_3_2_1_26_1","volume-title":"Intel\u00ae trusted execution technology","author":"Coperation Intel","year":"2011","unstructured":"Intel Coperation . Intel\u00ae trusted execution technology , 2011 . Intel Coperation. Intel\u00ae trusted execution technology, 2011."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel Corporation. Intel\u00ae Virtualization Technology Specification for Directed I\/O Specification. www.intel.com\/technology\/vt\/.  Intel Corporation. Intel \u00ae Virtualization Technology Specification for Directed I\/O Specification . www.intel.com\/technology\/vt\/."},{"key":"e_1_3_2_1_28_1","volume-title":"January","author":"Intel Corporation","year":"2011","unstructured":"Intel Corporation . Intel\u00ae PCI-SIG SR-IOV Primer: An Introduction to SR-IOV Technology , January 2011 . Intel Corporation. Intel\u00ae PCI-SIG SR-IOV Primer: An Introduction to SR-IOV Technology, January 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"Intel\u00ae 64 and ia-32 architectures software developer manuals","author":"Intel Inc.","year":"2009","unstructured":"Intel Inc. Intel\u00ae 64 and ia-32 architectures software developer manuals , 2009 . Intel Inc. Intel\u00ae 64 and ia-32 architectures software developer manuals, 2009."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592438"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958796"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_35_1","volume-title":"Black Hat Conference","author":"Kortchinsky K.","year":"2009","unstructured":"K. Kortchinsky . Cloudburst : Hacking 3d (and breaking out of vmware) . In Black Hat Conference , 2009 . K. Kortchinsky. Cloudburst: Hacking 3d (and breaking out of vmware). In Black Hat Conference, 2009."},{"key":"e_1_3_2_1_36_1","unstructured":"T. Krazit. CNET News. Google fired engineer for privacy breach. http:\/\/news.cnet.com\/8301-30684_3-20016451-265.html.  T. Krazit. CNET News. Google fired engineer for privacy breach . http:\/\/news.cnet.com\/8301-30684_3-20016451-265.html."},{"key":"e_1_3_2_1_37_1","unstructured":"B. Krebs. Amazon: Hey Spammers Get Off My Cloud! http:\/\/blog.washingtonpost.com\/securityfix\/2008\/07\/amazon\\_hey_spammers\\_get\\_off\\_my.html.  B. Krebs. Amazon: Hey Spammers Get Off My Cloud! http:\/\/blog.washingtonpost.com\/securityfix\/2008\/07\/amazon\\_hey_spammers\\_get\\_off\\_my.html."},{"key":"e_1_3_2_1_38_1","unstructured":"KVM. http:\/\/www.linux-kvm.org\/page\/Main_Page.  KVM. http:\/\/www.linux-kvm.org\/page\/Main_Page."},{"key":"e_1_3_2_1_39_1","first-page":"4","volume-title":"Proceedings of the 12th conference on Hot topics in operating systems, HotOS'09","author":"Litty L.","year":"2009","unstructured":"L. Litty , H. A. Lagar-Cavilla , and D. Lie . Computer meteorology: monitoring compute clouds . In Proceedings of the 12th conference on Hot topics in operating systems, HotOS'09 , pages 4 -- 4 , Berkeley, CA, USA , 2009 . USENIX Association. L. Litty, H. A. Lagar-Cavilla, and D. Lie. Computer meteorology: monitoring compute clouds. In Proceedings of the 12th conference on Hot topics in operating systems, HotOS'09, pages 4--4, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"e_1_3_2_1_42_1","first-page":"23","volume-title":"Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, ATEC '96","author":"McVoy L.","year":"1996","unstructured":"L. McVoy and C. Staelin . lmbench: portable tools for performance analysis . In Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, ATEC '96 , pages 23 -- 23 , Berkeley, CA, USA , 1996 . USENIX Association. L. McVoy and C. Staelin. lmbench: portable tools for performance analysis. In Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, ATEC '96, pages 23--23, Berkeley, CA, USA, 1996. USENIX Association."},{"key":"e_1_3_2_1_43_1","first-page":"116","volume-title":"Proceedings of the 20 th IEEE\/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03), MSS '03","author":"Meth K. Z.","unstructured":"K. Z. Meth and J. Satran . Design of the iscsi protocol . In Proceedings of the 20 th IEEE\/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03), MSS '03 , pages 116 --, Washington, DC, USA, 2003. IEEE Computer Society. K. Z. Meth and J. Satran. Design of the iscsi protocol. In Proceedings of the 20 th IEEE\/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03), MSS '03, pages 116--, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.48"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_23"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.472"},{"key":"e_1_3_2_1_48_1","unstructured":"Secunia. Vulnerability report: Vmware esx server 3.x. http:\/\/secunia.com\/advisories\/product\/10757\/.  Secunia. Vulnerability report: Vmware esx server 3.x . http:\/\/secunia.com\/advisories\/product\/10757\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Secunia. Xen multiple vulnerability report. http:\/\/secunia.com\/advisories\/44502\/.  Secunia. Xen multiple vulnerability report . http:\/\/secunia.com\/advisories\/44502\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217951"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"e_1_3_2_1_54_1","first-page":"155","volume-title":"Security and Applications","author":"Tomlinson A.","year":"2008","unstructured":"A. Tomlinson . Introduction to the tpm. Smart Cards, Tokens , Security and Applications , pages 155 -- 172 , 2008 . A. Tomlinson. Introduction to the tpm. Smart Cards, Tokens, Security and Applications, pages 155--172, 2008."},{"key":"e_1_3_2_1_55_1","unstructured":"VMware. http:\/\/www.vmware.com\/.  VMware. http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168849"},{"key":"e_1_3_2_1_57_1","volume-title":"Black Hat Conference","author":"Wojtczuk R.","year":"2008","unstructured":"R. Wojtczuk and J. Rutkowska . Xen Owning trilogy . In Black Hat Conference , 2008 . R. Wojtczuk and J. Rutkowska. Xen Owning trilogy. In Black Hat Conference, 2008."},{"key":"e_1_3_2_1_58_1","volume-title":"Invisible Things Lab","author":"Wojtczuk R.","year":"2009","unstructured":"R. Wojtczuk and J. Rutkowska . Attacking smm memory via intel cpu cache poisoning . Invisible Things Lab , 2009 . R. Wojtczuk and J. Rutkowska. Attacking smm memory via intel cpu cache poisoning. Invisible Things Lab, 2009."},{"key":"e_1_3_2_1_59_1","unstructured":"XEN. http:\/\/www.xen.org.  XEN. http:\/\/www.xen.org."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523680","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523680"}},"subtitle":["supporting user-configured privacy protection in cloud computing"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":60,"alternative-id":["10.1145\/2523649.2523680","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523680","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}