{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T03:21:23Z","timestamp":1772508083383,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["750809, 1834213, and 1834216"],"award-info":[{"award-number":["750809, 1834213, and 1834216"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485253","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2937-2950","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["CrossLine: Breaking \"Security-by-Crash\" based Memory Isolation in AMD SEV"],"prefix":"10.1145","author":[{"given":"Mengyuan","family":"Li","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AMD. 2008. AMD-V Nested Paging. http:\/\/developer.amd.com\/wordpress\/media\/2012\/10\/NPT-WP-1%201-final-TM.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"AMD. 2019. Secure Encrypted Virtualization API Version 0.22."},{"key":"e_1_3_2_2_3_1","volume-title":"2020 a. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. White paper","author":"AMD.","year":"2020","unstructured":"AMD. 2020 a. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. White paper (2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"System programming.","author":"AMD.","unstructured":"AMD. 2020 b. AMD64 architecture programmer's manual volume 2: System programming."},{"key":"e_1_3_2_2_5_1","unstructured":"AMD. 2020 c. AMDSEV\/SEV-ES Branch. https:\/\/github.com\/AMDESE\/AMDSEV\/tree\/sev-es commit = 969557455ee30f453da7d25af96291ea0236af77."},{"key":"e_1_3_2_2_6_1","volume-title":"Fault Attacks on Encrypted General Purpose Compute Platforms. In 7th ACM on Conference on Data and Application Security and Privacy. ACM.","author":"Buhren Robert","year":"2017","unstructured":"Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, and Julian Vetter. 2017. Fault Attacks on Encrypted General Purpose Compute Platforms. In 7th ACM on Conference on Data and Application Security and Privacy. ACM."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"e_1_3_2_2_8_1","volume-title":"Secure Encrypted Virtualization is Unsecure. arXiv preprint arXiv:1712.05090","author":"Du Zhao-Hui","year":"2017","unstructured":"Zhao-Hui Du, Zhiwei Ying, Zhenke Ma, Yufei Mai, Phoebe Wang, Jesse Liu, and Jesse Fang. 2017. Secure Encrypted Virtualization is Unsecure. arXiv preprint arXiv:1712.05090 (2017)."},{"key":"e_1_3_2_2_9_1","unstructured":"Google. 2020. Introducing Google Cloud Confidential Computing with Confidential VMs. https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-google-cloud-confidential-computing-with-confidential-vms."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Felicitas Hetzelt and Robert Buhren. 2017. Security analysis of encrypted virtual machines. In ACM SIGPLAN Notices. ACM.","DOI":"10.1145\/3050748.3050763"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660303"},{"key":"e_1_3_2_2_12_1","volume-title":"Protecting VM register state with SEV-ES. White paper","author":"Kaplan David","year":"2017","unstructured":"David Kaplan. 2017. Protecting VM register state with SEV-ES. White paper (2017)."},{"key":"e_1_3_2_2_13_1","unstructured":"David Kaplan. 2020. Upcoming x86 Technologies for Malicious Hypervisor Protection. https:\/\/static.sched.com\/hosted_files\/lsseu2019\/65\/SEV-SNP%20Slides%20Nov%201%202019.pdf."},{"key":"e_1_3_2_2_14_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_2_16_1","volume-title":"30th USENIX Security Symposium. 717--732","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium. 717--732."},{"key":"e_1_3_2_2_17_1","volume-title":"28th USENIX Security Symposium. 1257--1272","author":"Li Mengyuan","year":"2019","unstructured":"Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting Unprotected I\/O Operations in AMD's Secure Encrypted Virtualization. In 28th USENIX Security Symposium. 1257--1272."},{"key":"e_1_3_2_2_18_1","volume-title":"27th USENIX Security Symposium. 973--990","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, et al. 2018. Meltdown: Reading kernel memory from user space. In 27th USENIX Security Symposium. 973--990."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_2_21_1","volume-title":"AMD Security and Server Innovation. UEFI PlugFest-March","author":"Roger Lai AMD","year":"2013","unstructured":"AMD Roger Lai. 2013. AMD Security and Server Innovation. UEFI PlugFest-March (2013), 18--22."},{"key":"e_1_3_2_2_22_1","volume-title":"Julian Stecklina, Thomas Prescher, and Daniel Gruss.","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, and Daniel Gruss. 2019. ZombieLoad: Cross-privilege-boundary data sampling. arXiv preprint arXiv:1905.05726 (2019)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2752839"},{"key":"e_1_3_2_2_25_1","volume-title":"27th USENIX Security Symposium. 991--1008","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security Symposium. 991--1008."},{"key":"e_1_3_2_2_26_1","volume-title":"RIDL: Rogue In-Flight Data Load. 2019 IEEE Symposium on Security and Privacy","author":"van Schaik Stephan","year":"2019","unstructured":"Stephan van Schaik, Alyssa Milburn, Sebastian \u00d6sterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2019. RIDL: Rogue In-Flight Data Load. 2019 IEEE Symposium on Security and Privacy (2019)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329820"},{"key":"e_1_3_2_2_28_1","volume-title":"SEVurity: No Security Without Integrity--Breaking Integrity-Free Memory Encryption with Minimal Assumptions. 2020 IEEE Symposium on Security and Privacy","author":"Wilke Luca","year":"2020","unstructured":"Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth. 2020. SEVurity: No Security Without Integrity--Breaking Integrity-Free Memory Encryption with Minimal Assumptions. 2020 IEEE Symposium on Security and Privacy (2020)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485253","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:11Z","timestamp":1763499251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":28,"alternative-id":["10.1145\/3460120.3485253","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485253","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}