{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:30:40Z","timestamp":1777105840100,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61572278"],"award-info":[{"award-number":["61572278"]}]},{"name":"NSFC","award":["U1736209"],"award-info":[{"award-number":["U1736209"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1453020"],"award-info":[{"award-number":["1453020"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304034","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"93-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure"],"prefix":"10.1145","author":[{"given":"Xiantao","family":"Zhang","sequence":"first","affiliation":[{"name":"Alibaba Group, Shanghai, China"}]},{"given":"Xiao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Alibaba Group, Shanghai, China"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Junkang","family":"Fu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Shanghai, China"}]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Shanghai, China"}]},{"given":"Yibin","family":"Shen","sequence":"additional","affiliation":[{"name":"Alibaba Group, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"security in plaintext. https:\/\/bit.ly\/2jSjru3","year":"2017","unstructured":"7 ways we harden our kvm hypervisor at google cloud: security in plaintext. https:\/\/bit.ly\/2jSjru3, 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/software.intel.com\/sites\/default\/files\/managed\/c5\/15\/vt-directed-io-spec.pdf","author":"Intel\u00ae","year":"2018","unstructured":"Intel\u00ae virtualization technology for directed i\/o architecture specification. https:\/\/software.intel.com\/sites\/default\/files\/managed\/c5\/15\/vt-directed-io-spec.pdf, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=kvm","author":"Search","year":"2018","unstructured":"Search results for cve in kvm. https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=kvm, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026899"},{"key":"e_1_3_2_1_5_1","volume-title":"Intel virtualization technology for directed i\/o. Intel technology journal, 10(3)","author":"Abramson Darren","year":"2006","unstructured":"Darren Abramson, Jeff Jackson, Sridhar Muthrasanallur, Gil Neiger, Greg Regnier, Rajesh Sankaran, Ioannis Schoinas, Rich Uhlig, Balaji Vembu, and John Wiegert. Intel virtualization technology for directed i\/o. Intel technology journal, 10(3), 2006."},{"key":"e_1_3_2_1_6_1","unstructured":"AMD. Amd i\/o virtualization technology (iommu) specification. 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_3_2_1_8_1","volume-title":"March 27","author":"Belay Adam M","year":"2012","unstructured":"Adam M Belay. Migrating virtual machines configured with pass-through devices, March 27 2012. US Patent 8,146,082."},{"key":"e_1_3_2_1_9_1","unstructured":"Apache Bench. ab-apache http server benchmarking tool."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254834"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241287"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251223"},{"key":"e_1_3_2_1_13_1","volume-title":"Intel\u00ae 64 and ia-32 architectures software developer manuals. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation. Intel\u00ae 64 and ia-32 architectures software developer manuals. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Intel\u00ae virtualization technology (intel\u00ae vt). https:\/\/www.intel.com\/content\/www\/us\/en\/virtualization\/virtualization-technology\/intel-virtualization-technology.html","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation. Intel\u00ae virtualization technology (intel\u00ae vt). https:\/\/www.intel.com\/content\/www\/us\/en\/virtualization\/virtualization-technology\/intel-virtualization-technology.html, 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"Intel analysis of speculative execution side channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf","author":"Intel Corporation","year":"2018","unstructured":"Intel Corporation. Intel analysis of speculative execution side channels. https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf, 2018."},{"key":"e_1_3_2_1_16_1","volume-title":"Intel processor microcode package for linux description. https:\/\/downloadcenter.intel.com\/download\/27945\/Linux-Processor-Microcode-Data-File?product=873","author":"Intel Corporation","year":"2018","unstructured":"Intel Corporation. Intel processor microcode package for linux description. https:\/\/downloadcenter.intel.com\/download\/27945\/Linux-Processor-Microcode-Data-File?product=873, 2018."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2287056.2287062"},{"key":"e_1_3_2_1_18_1","volume-title":"September 10","author":"Dong Yaozu","year":"2013","unstructured":"Yaozu Dong. Efficent migration of virtual functions to enable high availability and resource rebalance, September 10 2013. US Patent 8,533,713."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_20_1","volume-title":"Intel virtualization technology for directed i\/o (intel vt-d). Technology@ Intel Magazine, 4(10)","author":"Hiremane Radhakrishna","year":"2007","unstructured":"Radhakrishna Hiremane. Intel virtualization technology for directed i\/o (intel vt-d). Technology@ Intel Magazine, 4(10), 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2009.5289170"},{"key":"e_1_3_2_1_22_1","volume-title":"Netperf: a network performance benchmark. Information Networks Division","author":"Rick Jones","year":"1996","unstructured":"Rick Jones et al. Netperf: a network performance benchmark. Information Networks Division, Hewlett-Packard Company, 1996."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855865.1855867"},{"key":"e_1_3_2_1_24_1","volume-title":"Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv:1801.01203","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv:1801.01203, 2018."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391252"},{"key":"e_1_3_2_1_26_1","unstructured":"Alexey Kopytov. Sysbench: a system performance benchmark. http:\/\/sysbench. sourceforge. net\/ 2004."},{"key":"e_1_3_2_1_27_1","volume-title":"kpatch: Dynamic kernel patching","year":"2018","unstructured":"Kpatch. kpatch: Dynamic kernel patching. 2018."},{"key":"e_1_3_2_1_28_1","volume-title":"Mnist handwritten digit database. AT&T Labs {Online}. Available: http:\/\/yann. lecun. com\/exdb\/mnist, 2","author":"LeCun Yann","year":"2010","unstructured":"Yann LeCun, Corinna Cortes, and CJ Burges. Mnist handwritten digit database. AT&T Labs {Online}. Available: http:\/\/yann. lecun. com\/exdb\/mnist, 2, 2010."},{"key":"e_1_3_2_1_29_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown. arXiv preprint arXiv:1801.01207, 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1551609.1551630"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186411.3186414"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151040"},{"key":"e_1_3_2_1_33_1","volume-title":"Technical report, SUSE, Maxfeldstrasse 5 90409 Nuremberg Germany","author":"Pavl'ik V","year":"2014","unstructured":"V Pavl'ik. kgraft--live patching of the linux kernel. Technical report, Technical report, SUSE, Maxfeldstrasse 5 90409 Nuremberg Germany, 2014."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.112"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212908.2212920"},{"key":"e_1_3_2_1_37_1","volume-title":"KVM Forum","volume":"2014","author":"Song Jike","year":"2014","unstructured":"Jike Song, Zhiyuan Lv, and Kevin Tian. Kvmgt: A full gpu virtualization solution. In KVM Forum, volume 2014, 2014."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2643634.2643647"},{"key":"e_1_3_2_1_39_1","volume-title":"Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886","author":"Turner Paul","year":"2018","unstructured":"Paul Turner. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/7625886, 2018."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_23"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168850"},{"key":"e_1_3_2_1_42_1","first-page":"261","volume-title":"OLS'08: The 2008 Ottawa Linux Symposium","author":"Zhai Edwin","year":"2008","unstructured":"Edwin Zhai, Gregory D Cummings, and Yaozu Dong. Live migration with pass-through device for linux vm. In OLS'08: The 2008 Ottawa Linux Symposium, pages 261--268, 2008."}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304034","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:14Z","timestamp":1750204394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":42,"alternative-id":["10.1145\/3297858.3304034","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304034","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}