{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:03Z","timestamp":1750220883271,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339262","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Strong Tenant Separation in Cloud Computing Platforms"],"prefix":"10.1145","author":[{"given":"Michael","family":"Pfeiffer","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau"}]},{"given":"Michael","family":"Rossberg","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau"}]},{"given":"Simon","family":"Buttgereit","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau"}]},{"given":"Guenter","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"Proceedings of the 6th ACM SIGCOMM Workshop on Hot Topics in Networks.","year":"2007","author":"Andersen David G","key":"e_1_3_2_1_1_1"},{"volume-title":"Lai","year":"2018","author":"Chen Guoxing","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Catalin Cimpanu. 2018. Cisco removed its seventh backdoor account this year and that's a good thing. https:\/\/www.zdnet.com\/article\/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing\/  Catalin Cimpanu. 2018. Cisco removed its seventh backdoor account this year and that's a good thing. https:\/\/www.zdnet.com\/article\/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing\/"},{"volume-title":"Tuttle","year":"2018","author":"Cook Byron","key":"e_1_3_2_1_4_1"},{"volume-title":"Virtunoid: A KVM Guest\u2192Host privilege escalation exploit. https:\/\/media.blackhat.com\/bh-us-11\/Elhage\/BH_US_11_Elhage_Virtunoid_WP.pdf","year":"2011","author":"Elhage Nelson","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Amazon Web Services Incorporated. 2019. Amazon EC2 Instance Types. https:\/\/aws.amazon.com\/ec2\/instance-types\/  Amazon Web Services Incorporated. 2019. Amazon EC2 Instance Types. https:\/\/aws.amazon.com\/ec2\/instance-types\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.55"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389792"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29919-8_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. (2018). http:\/\/arxiv.org\/abs\/1801.01203  Paul Kocher Daniel Genkin Daniel Gruss Werner Haas Mike Hamburg Moritz Lipp Stefan Mangard Thomas Prescher Michael Schwarz and Yuval Yarom. 2018. Spectre attacks: Exploiting speculative execution. (2018). http:\/\/arxiv.org\/abs\/1801.01203","DOI":"10.1109\/SP.2019.00002"},{"volume-title":"27th USENIX Security Symposium. 973--990","year":"2018","author":"Lipp Moritz","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Peter Mell and Tim Grance. 2011. The NIST Definition of Cloud Computing.  Peter Mell and Tim Grance. 2011. The NIST Definition of Cloud Computing.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628194.2628195"},{"volume-title":"Proceedings of the conference on Hot topics in cloud computing.","year":"2009","author":"Santos Nuno","key":"e_1_3_2_1_15_1"},{"volume-title":"Foundations of Modern Networking (1 ed.)","author":"Stallings William","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.51"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151022"},{"volume-title":"27th USENIX Security Symposium. 991--1008","year":"2018","author":"Bulck Jo Van","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_21_1","unstructured":"Rafal Wojtczuk. 2008. Adventures with a certain Xen vulnerability (in the PVFB backend). https:\/\/invisiblethingslab.com\/resources\/misc08\/xenfb-adventures-10.pdf  Rafal Wojtczuk. 2008. Adventures with a certain Xen vulnerability (in the PVFB backend). https:\/\/invisiblethingslab.com\/resources\/misc08\/xenfb-adventures-10.pdf"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":21,"alternative-id":["10.1145\/3339252.3339262","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339262","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}