{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081731,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["JPMJCR1683"],"award-info":[{"award-number":["JPMJCR1683"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134648","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"542-552","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Nioh"],"prefix":"10.1145","author":[{"given":"Junya","family":"Ogasawara","sequence":"first","affiliation":[{"name":"Keio University"}]},{"given":"Kenji","family":"Kono","sequence":"additional","affiliation":[{"name":"Keio University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Filebench - A Model Based File System Workload Generator. https:\/\/github.com\/filebench\/filebench. (2017).  2017. Filebench - A Model Based File System Workload Generator. https:\/\/github.com\/filebench\/filebench. (2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"AMD. 2017. AMD64 Architecture Programmer's Manual Volume 2: System Programming. http:\/\/support.amd.com\/TechDocs\/24593.pdf. (2017).  AMD. 2017. AMD64 Architecture Programmer's Manual Volume 2: System Programming. http:\/\/support.amd.com\/TechDocs\/24593.pdf. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815420"},{"key":"e_1_3_2_1_4_1","volume-title":"Innovative Technology for CPU Based Attestation and Sealing. In HASP'13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative Technology for CPU Based Attestation and Sealing. In HASP'13 . 1--7. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In HASP'13. 1--7."},{"key":"e_1_3_2_1_5_1","volume-title":"Senior Product Manager at Google inc.","author":"Honig Andy","year":"2017","unstructured":"Andy Honig , Technical Lead Manager and Nelly Porter , Senior Product Manager at Google inc. 2017 . 7 ways we harden our KVM hypervisor at Google Cloud : security in plaintext. https:\/\/cloudplatform.googleblog.com\/2017\/01\/7-ways-we-harden-our-KVM-hypervisor-at-Google-Cloud-security-in-plaintext.html. (2017). Andy Honig, Technical Lead Manager and Nelly Porter, Senior Product Manager at Google inc. 2017. 7 ways we harden our KVM hypervisor at Google Cloud: security in plaintext. https:\/\/cloudplatform.googleblog.com\/2017\/01\/7-ways-we-harden-our-KVM-hypervisor-at-Google-Cloud-security-in-plaintext.html. (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2005 Conference on","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a Fast and Portable Dynamic Translator. USENIX Annual Technical Conference . Proceedings of the 2005 Conference on (2005), 41--46. https:\/\/www.usenix.org\/legacy\/publications\/library\/proceedings\/usenix05\/tech\/freenix\/bellard.html Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. USENIX Annual Technical Conference. Proceedings of the 2005 Conference on (2005), 41--46. https:\/\/www.usenix.org\/legacy\/publications\/library\/proceedings\/usenix05\/tech\/freenix\/bellard.html"},{"key":"e_1_3_2_1_8_1","unstructured":"The Rust Community. 2017. The Rust Programming Language. https:\/\/www.rust-lang.org\/. (2017).  The Rust Community. 2017. The Rust Programming Language. https:\/\/www.rust-lang.org\/. (2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Corporation. 1995. 82078 64 PIN CHMOS SINGLE-CHIP FLOPPY DISK CONTROLLER.  Intel Corporation. 1995. 82078 64 PIN CHMOS SINGLE-CHIP FLOPPY DISK CONTROLLER."},{"key":"e_1_3_2_1_10_1","unstructured":"Intel Corporation. 1997. 82371FB (PIIX) AND 82371SB (PIIX3) PCI ISA IDE XCEL-ERATOR.  Intel Corporation. 1997. 82371FB (PIIX) AND 82371SB (PIIX3) PCI ISA IDE XCEL-ERATOR."},{"key":"e_1_3_2_1_11_1","unstructured":"CrowdStrike. 2015. VENOM Vulnerability. http:\/\/venom.crowdstrike.com\/. (2015).  CrowdStrike. 2015. VENOM Vulnerability. http:\/\/venom.crowdstrike.com\/. (2015)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2013.20"},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2017. Building Custom Operating Systems. https:\/\/cloud.google.com\/compute\/docs\/images\/building-custom-os. (2017).  Google. 2017. Building Custom Operating Systems. https:\/\/cloud.google.com\/compute\/docs\/images\/building-custom-os. (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2017. Google Compute Engine. https:\/\/cloud.google.com\/compute\/. (2017).  Google. 2017. Google Compute Engine. https:\/\/cloud.google.com\/compute\/. (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel. 2017. Intel Virtualization Technology(Intel VT). http:\/\/www.intel.com\/content\/www\/us\/en\/virtualization\/virtualization-technology\/intel-virtualization-technology.html. (2017).  Intel. 2017. Intel Virtualization Technology(Intel VT). http:\/\/www.intel.com\/content\/www\/us\/en\/virtualization\/virtualization-technology\/intel-virtualization-technology.html. (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155652"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Linux Symposium 1","author":"Kivity Avi","year":"2007","unstructured":"Avi Kivity , Uri Lublin , Anthony Liguori , Yaniv Kamay , and Dor Laor . 2007 . kvm: the Linux virtual machine monitor . Proceedings of the Linux Symposium 1 (2007), 225--230. Avi Kivity, Uri Lublin, Anthony Liguori, Yaniv Kamay, and Dor Laor. 2007. kvm: the Linux virtual machine monitor. Proceedings of the Linux Symposium 1 (2007), 225--230."},{"key":"e_1_3_2_1_19_1","unstructured":"Kostya Kortchinsky. 2009. Cloudburst. https:\/\/www.blackhat.com\/presentations\/bh-usa-09\/KORTCHINSKY\/BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdf. (2009).  Kostya Kortchinsky. 2009. Cloudburst. https:\/\/www.blackhat.com\/presentations\/bh-usa-09\/KORTCHINSKY\/BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdf. (2009)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_21_1","unstructured":"National Institute of Standards and Technology. 2017. National Vulnerability Database. https:\/\/nvd.nist.gov\/. (2017).  National Institute of Standards and Technology. 2017. National Vulnerability Database. https:\/\/nvd.nist.gov\/. (2017)."},{"key":"e_1_3_2_1_22_1","unstructured":"ORACLE. 2017. Developer - Oracle VM VirtualBox. https:\/\/www.virtualbox.org\/wiki\/Developer_FAQ. (2017).  ORACLE. 2017. Developer - Oracle VM VirtualBox. https:\/\/www.virtualbox.org\/wiki\/Developer_FAQ. (2017)."},{"key":"e_1_3_2_1_23_1","unstructured":"oss security. 2015. 'Re: {oss-security} VENOM - CVE-2015-3456' - MARC. https:\/\/marc.info\/?l=oss-security&m=143155206320935&w=2. (2015).  oss security. 2015. 'Re: {oss-security} VENOM - CVE-2015-3456' - MARC. https:\/\/marc.info\/?l=oss-security&m=143155206320935&w=2. (2015)."},{"key":"e_1_3_2_1_24_1","unstructured":"qemu devel. 2016. {Qemu-devel} {PATCH v2} ide: ahci: reset ncq object to unused on error. https:\/\/lists.gnu.org\/archive\/html\/qemu-devel\/2016-01\/msg01184.html. (2016).  qemu devel. 2016. {Qemu-devel} {PATCH v2} ide: ahci: reset ncq object to unused on error. https:\/\/lists.gnu.org\/archive\/html\/qemu-devel\/2016-01\/msg01184.html. (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Lei Shi Yuming Wu Yubin Xia Nathan Dautenhahn and Haibo Chen. 2017. Deconstructing Xen. March (2017).  Lei Shi Yuming Wu Yubin Xia Nathan Dautenhahn and Haibo Chen. 2017. Deconstructing Xen. March (2017).","DOI":"10.14722\/ndss.2017.23455"},{"key":"e_1_3_2_1_26_1","unstructured":"PCI SIG. 2010. Single Root I\/O Virtualization and Sharing Specification Revision 1.1.  PCI SIG. 2010. Single Root I\/O Virtualization and Sharing Specification Revision 1.1."},{"key":"e_1_3_2_1_27_1","volume-title":"Securing Self-Virtualizing Ethernet Devices. USENIX SEC 2015","author":"Smolyar Igor","year":"2015","unstructured":"Igor Smolyar and Muli Ben-yehuda. 2015 . Securing Self-Virtualizing Ethernet Devices. USENIX SEC 2015 (2015), 335--350. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-smolyar.pdf Igor Smolyar and Muli Ben-yehuda. 2015. Securing Self-Virtualizing Ethernet Devices. USENIX SEC 2015 (2015), 335--350. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-smolyar.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"key":"e_1_3_2_1_31_1","unstructured":"T13. 2002. Information Technology - AT Attachment with Packet Interface - 6 ( ATA\/ATAPI-6).  T13. 2002. Information Technology - AT Attachment with Packet Interface - 6 ( ATA\/ATAPI-6)."},{"key":"e_1_3_2_1_32_1","unstructured":"Xenproject.org Security Team. 2017. Xen Security Advisory. https:\/\/xenbits.xen.org\/xsa\/. (2017).  Xenproject.org Security Team. 2017. Xen Security Advisory. https:\/\/xenbits.xen.org\/xsa\/. (2017)."},{"key":"e_1_3_2_1_33_1","volume-title":"Magic Quadrant for x86 Server Virtualization Infrastructure. https:\/\/www.gartner.com\/doc\/reprints?ct=160707&id=1-3B9FAM0&st=sb. (August","author":"Bittman Michael Warrilow","year":"2016","unstructured":"Michael Warrilow Thomas J. Bittman , Philip Dawson . 2016. Magic Quadrant for x86 Server Virtualization Infrastructure. https:\/\/www.gartner.com\/doc\/reprints?ct=160707&id=1-3B9FAM0&st=sb. (August 2016 ). Michael Warrilow Thomas J. Bittman, Philip Dawson. 2016. Magic Quadrant for x86 Server Virtualization Infrastructure. https:\/\/www.gartner.com\/doc\/reprints?ct=160707&id=1-3B9FAM0&st=sb. (August 2016)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522323"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134648","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134648"}},"subtitle":["Hardening The Hypervisor by Filtering Illegal I\/O Requests to Virtual Devices"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":35,"alternative-id":["10.1145\/3134600.3134648","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134648","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}