{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:50:11Z","timestamp":1777733411769,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation-Prime Minister's office, Republic of Singapore","award":["CREATE E2S2"],"award-info":[{"award-number":["CREATE E2S2"]}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["14511100902"],"award-info":[{"award-number":["14511100902"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303011"],"award-info":[{"award-number":["61303011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["TS0220103006, ZXZY037003"],"award-info":[{"award-number":["TS0220103006, ZXZY037003"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813690","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1607-1619","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":97,"title":["Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation"],"prefix":"10.1145","author":[{"given":"Yutao","family":"Liu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Tianyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Kexin","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CIL. http:\/\/kerneis.github.io\/cil\/.  CIL. http:\/\/kerneis.github.io\/cil\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Coppersmith's attack. http:\/\/en.wikipedia.org\/wiki\/Coppersmith's_Attack.  Coppersmith's attack. http:\/\/en.wikipedia.org\/wiki\/Coppersmith's_Attack."},{"key":"e_1_3_2_1_3_1","unstructured":"The heartbleed bug. http:\/\/heartbleed.com\/.  The heartbleed bug. http:\/\/heartbleed.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"How heartbleed leaked private keys. http:\/\/blog.cloudflare.com\/searching-for-the-prime-suspect-how-heartbleed-leaked-private-keys\/.  How heartbleed leaked private keys. http:\/\/blog.cloudflare.com\/searching-for-the-prime-suspect-how-heartbleed-leaked-private-keys\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Http persistent connection wiki. https:\/\/en.wikipedia.org\/wiki\/HTTP_persistent_connection.  Http persistent connection wiki. https:\/\/en.wikipedia.org\/wiki\/HTTP_persistent_connection."},{"key":"e_1_3_2_1_6_1","unstructured":"Poc of private key leakage using heartbleed. https:\/\/github.com\/einaros\/heartbleed-tools.  Poc of private key leakage using heartbleed. https:\/\/github.com\/einaros\/heartbleed-tools."},{"key":"e_1_3_2_1_7_1","unstructured":"Polyvariance. http:\/\/en.wikipedia.org\/wiki\/Polyvariance.  Polyvariance. http:\/\/en.wikipedia.org\/wiki\/Polyvariance."},{"key":"e_1_3_2_1_8_1","unstructured":"Secure heap patch for heartbleed. http:\/\/www.mail-archive.com\/openssl-users@openssl.org\/msg73503.html.  Secure heap patch for heartbleed. http:\/\/www.mail-archive.com\/openssl-users@openssl.org\/msg73503.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Xen as high-performance nfv platform. http:\/\/events.linuxfoundation.org\/sites\/events\/files\/ slides\/XenAsHighPerformanceNFVPlatform.pdf.  Xen as high-performance nfv platform. http:\/\/events.linuxfoundation.org\/sites\/events\/files\/ slides\/XenAsHighPerformanceNFVPlatform.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"OSDI","author":"Baumann A.","year":"2014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_1_13_1","volume-title":"Usenix Security","author":"Brumley D.","year":"2004"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2007.05.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995914"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516743"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315294"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23125"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759508.1759525"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750406"},{"key":"e_1_3_2_1_31_1","volume-title":"ATC","author":"Li Y.","year":"2014"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA419599"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14597-1_3"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958812"},{"key":"e_1_3_2_1_39_1","volume-title":"Journal of Computer Security","author":"Smith G.","year":"1996"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664259"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382200"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"e_1_3_2_1_45_1","volume-title":"OSDI","author":"Ta-Min R.","year":"2006"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"e_1_3_2_1_47_1","volume-title":"ISCA","author":"Vilanova L.","year":"2014"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168850"},{"key":"e_1_3_2_1_49_1","volume-title":"ISCA","author":"Woodruff J.","year":"2014"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522323"},{"key":"e_1_3_2_1_51_1","volume-title":"DCDV","author":"Xia Y.","year":"2012"},{"key":"e_1_3_2_1_52_1","article-title":"Secure outsourcing of virtual appliance","author":"Xia Y.","year":"2015","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346267"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":53,"alternative-id":["10.1145\/2810103.2813690","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813690","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}