{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:07:20Z","timestamp":1724692040670},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transinf.2019edp7186","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:13:02Z","timestamp":1593555182000},"page":"1660-1671","source":"Crossref","is-referenced-by-count":1,"title":["Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Kenta","family":"ISHIGURO","sequence":"first","affiliation":[{"name":"Department of Information and Computer Science, Keio University"}]},{"given":"Kenji","family":"KONO","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, Keio University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] KVM, \u201cKVM.\u201d http:\/\/www.linux-kvm.org\/page\/Main_Page, 2016."},{"key":"2","unstructured":"[2] X.S. Team, \u201cXen security advisory.\u201d https:\/\/xenbits.xen.org\/xsa\/, 2017."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N. Amit, D. Tsafrir, A. Schuster, A. Ayoub, and E. Shlomo, \u201cVirtual CPU Validation,\u201d Proc. 25th Symposium on Operating Systems Principles, SOSP &apos;15, New York, NY, USA, pp.311-327, ACM, 2015. 10.1145\/2815400.2815420","DOI":"10.1145\/2815400.2815420"},{"key":"4","unstructured":"[4] Andrea Arcangeli, \u201cUsing Linux as Hypervisor with KVM.\u201d https:\/\/indico.cern.ch\/event\/39755\/attachments\/797208\/1092716\/slides.pdf, 2008."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] G.J. Popek and R.P. Goldberg, \u201cFormal Requirements for Virtualizable Third Generation Architectures,\u201d Commun. ACM, vol.17, no.7, pp.412-421, July 1974. 10.1145\/361011.361073","DOI":"10.1145\/361011.361073"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] J.S. Robin and C.E. Irvine, \u201cAnalysis of the Intel Pentium&apos;s Ability to Support a Secure Virtual Machine Monitor,\u201d Proc. 9th Conference on USENIX Security Symposium-Volume 9, pp.129-144, 2000. 10.21236\/ada423654","DOI":"10.21236\/ADA423654"},{"key":"7","unstructured":"[7] Paolo Bonzini, \u201cKVM: x86 emulator: emulate MOVAPS and MOVAPD SSE instructions. Linux Kernel Mailing List.\u201d https:\/\/lkml.org\/lkml\/2014\/3\/17\/384, 2014."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] K. Ishiguro and K. Kono, \u201cHardening hypervisors against vulnerabilities in instruction emulators,\u201d Proc. 11th European Workshop on Systems Security, EuroSec&apos;18, New York, NY, USA, pp.7:1-7:6, ACM, 2018. 10.1145\/3193111.3193118","DOI":"10.1145\/3193111.3193118"},{"key":"9","unstructured":"[9] Intel corporation, \u201cIntel 64 and IA-32 Architectures Software Developer&apos;s Manual,\u201d 2019. Reference number: 325384-069US."},{"key":"10","unstructured":"[10] Nitin A Kamble, \u201cKVM: VMX: Support Unrestricted Guest feature. Linux Kernel Mailing List.\u201d https:\/\/lkml.org\/lkml\/2009\/8\/16\/41, 2009."},{"key":"11","unstructured":"[11] Nitin A Kamble, \u201cUnrestricted guest support in VMX. Xen.org mailing list.\u201d http:\/\/old-list-archives.xenproject.org\/xen-devel\/2009-05\/msg01196.html, 2009."},{"key":"12","unstructured":"[12] \u201cUnix Bench.\u201d https:\/\/github.com\/kdlucas\/byte-unixbench, 2017."},{"key":"13","unstructured":"[13] \u201csysbench.\u201d https:\/\/github.com\/akopytov\/sysbench, 2017."},{"key":"14","unstructured":"[14] \u201cab-Apache HTTP server benchmarking tool.\u201d https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html, 2017."},{"key":"15","unstructured":"[15] Phoronix. https:\/\/www.phoronix-test-suite.com\/."},{"key":"16","unstructured":"[16] \u201cThe Mesa 3D Graphics Library.\u201d https:\/\/www.mesa3d.org\/llvmpipe.html."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J. Ogasawara and K. Kono, \u201cNioh: Hardening the hypervisor by filtering illegal i\/o requests to virtual devices,\u201d Proc. 33rd Annual Computer Security Applications Conference, ACSAC 2017, New York, NY, USA, pp.542-552, ACM, 2017. 10.1145\/3134600.3134648","DOI":"10.1145\/3134600.3134648"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] L. Deng, P. Liu, J. Xu, P. Chen, and Q. Zeng, \u201cDancing with wolves: Towards practical event-driven vmm monitoring,\u201d Proc. 13th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE &apos;17, New York, NY, USA, pp.83-96, ACM, 2017. 10.1145\/3050748.3050750","DOI":"10.1145\/3050748.3050750"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] Z. Wang and X. Jiang, \u201cHyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity,\u201d 2010 IEEE Symposium on Security and Privacy, pp.380-395, 2010. 10.1109\/sp.2010.30","DOI":"10.1109\/SP.2010.30"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] B. Ding, Y. He, Y. Wu, and Y. Lin, \u201cHyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data,\u201d 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, SERE-C &apos;13, Washington, DC, USA, pp.26-34, 2013. 10.1109\/sere-c.2013.20","DOI":"10.1109\/SERE-C.2013.20"},{"key":"21","unstructured":"[21] P. Fonseca, X. Wang, and A. Krishnamurthy, \u201cMultinyx: A multi-level abstraction framework for systematic analysis of hypervisors,\u201d Proc. Thirteenth EuroSys Conference, EuroSys &apos;18, New York, NY, USA, pp.23:1-23:12, ACM, 2018. 10.1145\/3190508.3190529"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] A. Nguyen, H. Raj, S. Rayanchu, S. Saroiu, and A. Wolman, \u201cDelusional boot: Securing hypervisors without massive re-engineering,\u201d Proc. 7th ACM European Conference on Computer Systems, EuroSys &apos;12, New York, NY, USA, pp.141-154, ACM, 2012. 10.1145\/2168836.2168851","DOI":"10.1145\/2168836.2168851"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] J. Szefer, E. Keller, R.B. Lee, and J. Rexford, \u201cEliminating the hypervisor attack surface for a more secure cloud,\u201d Proc. 18th ACM Conference on Computer and Communications Security, CCS &apos;11, New York, NY, USA, pp.401-412, ACM, 2011. 10.1145\/2046707.2046754","DOI":"10.1145\/2046707.2046754"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] U. Steinberg and B. Kauer, \u201cNOVA: A Microhypervisor-based Secure Virtualization Architecture,\u201d Proc. 5th European Conference on Computer Systems, EuroSys &apos;10, New York, NY, USA, pp.209-222, ACM, 2010. 10.1145\/1755913.1755935","DOI":"10.1145\/1755913.1755935"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] L. Shi, Y. Wu, Y. Xia, N. Dautenhahn, H. Chen, B. Zang, H. Guan, and J. Li, \u201cDeconstructing Xen,\u201d Proceedings 2017 Network and Distributed System Security Symposium, Feb. 2017. 10.14722\/ndss.2017.23455","DOI":"10.14722\/ndss.2017.23455"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] Z. Wang, C. Wu, M. Grace, and X. Jiang, \u201cIsolating commodity hosted hypervisors with HyperLock,\u201d Proc. 7th ACM European Conference on Computer Systems, EuroSys &apos;12, New York, NY, USA, pp.127-140, ACM, 2012. 10.1145\/2168836.2168850","DOI":"10.1145\/2168836.2168850"},{"key":"27","unstructured":"[27] C. Wu, Z. Wang, and X. Jiang, \u201cTaming hosted hypervisors with (mostly) deprivileged execution.,\u201d The Network and Distributed System Security Symposium 2013, NDSS &apos;13, The Internet Society, 2013."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019EDP7186\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T03:23:33Z","timestamp":1593833013000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019EDP7186\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7186","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}