{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T23:10:20Z","timestamp":1696374620498},"reference-count":37,"publisher":"International Academy Publishing (IAP)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.9.2107-2118","type":"journal-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T05:49:29Z","timestamp":1349329769000},"source":"Crossref","is-referenced-by-count":2,"title":["A Hardware Virtualization Based Component Sandboxing Architecture"],"prefix":"10.17706","volume":"7","author":[{"given":"Nuwan","family":"Goonasekera","sequence":"first","affiliation":[]},{"given":"William","family":"Caelli","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Fidge","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,9,1]]},"reference":[{"key":"ref1","volume-title":"Modern Operating Systems","author":"Tanenbaum","year":"2001","unstructured":"[1] A. S. Tanenbaum, Modern Operating Systems, 2nd ed.: Prentice Hall, 2001."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595182"},{"key":"ref3","first-page":"388","article-title":"Checking array bound violation using segmentation hardware","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks","author":"Lam","year":"2005","unstructured":"[5] L. Lam and T. Chiueh, \"Checking array bound violation using segmentation hardware,\" in Proceedings of the International Conference on Dependable Systems and Networks, 2005, pp. 388-397."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1168054.1168069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945466"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-005-0654-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.156"},{"key":"ref8","volume-title":"Component Software - Beyond Object-Oriented Programming","author":"Szyperski","year":"2002","unstructured":"[12] C. Szyperski, Component Software - Beyond Object-Oriented Programming, 2nd ed.: Addison-Wesley, 2002."},{"key":"ref9","first-page":"41","article-title":"A comparison of OS extension technologies","volume-title":"Proceedings of the USENIX 1996 Annual Technical Conference","author":"Small","year":"1996","unstructured":"[13] C. Small and M. Seltzer, \"A comparison of OS extension technologies,\" in Proceedings of the USENIX 1996 Annual Technical Conference, San Diego, CA, 1996, pp. 41-54."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.86"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1168919.1168860"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319161"},{"key":"ref15","first-page":"293","article-title":"Vx32: Lightweight User-level Sandboxing on the x86","volume-title":"USENIX Annual Technical Conference","author":"Ford","year":"2008","unstructured":"[22] B. Ford and R. Cox, \"Vx32: Lightweight User-level Sandboxing on the x86,\" in USENIX Annual Technical Conference, Boston, MA, 2008, pp. 293\u2013306."},{"key":"ref16","article-title":"Flexible OS support and applications for trusted computing","volume-title":"Proceedings of the 9th conference on Hot Topics in Operating Systems","volume":"9","author":"Garfinkel","year":"2003","unstructured":"[23] T. Garfinkel, et al., \"Flexible OS support and applications for trusted computing,\" presented at the Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9, Lihue, Hawaii, 2003."},{"key":"ref17","volume-title":"64 and IA-32 Architectures Software Developer s Manual Volume 3B vol 3B System Programming Guide","author":"Intel","year":"2007","unstructured":"[25] Intel, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3B vol. 3B: System Programming Guide: Intel Corporation, 2007."},{"key":"ref18","article-title":"Virtualizing I\/O Devices on VMware Workstation's Hosted Virtual Machine Monitor","volume-title":"2002 USENIX Annual Technical Conference","author":"Sugerman","year":"2001","unstructured":"[27] J. Sugerman, et al., \"Virtualizing I\/O Devices on VMware Workstation's Hosted Virtual Machine Monitor,\" presented at the Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2001."},{"key":"ref19","first-page":"10","article-title":"Analysis of the Intel Pentium's ability to support a secure virtual machine monitor","volume-title":"Proceedings of the 9th USENIX Security Symposium","author":"Robin","year":"2000","unstructured":"[28] J. S. Robin and C. E. Irvine, \"Analysis of the Intel Pentium's ability to support a secure virtual machine monitor,\" in Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, 2000, p. 10."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"ref21","article-title":"Safe hardware access with the Xen virtual machine monitor","volume-title":"1st Workshop on Operating System and Architectural Support for the On-Demand IT Infrastructure","author":"Fraser","year":"2004","unstructured":"[30] K. Fraser, et al., \"Safe hardware access with the Xen virtual machine monitor,\" presented at the 1st Workshop on Operating System and Architectural Support for the On-Demand IT Infrastructure, Boston, MA, 2004."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265930"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[3] M. M. Swift, et al., \"Nooks: an architecture for reliable device drivers,\" presented at the Proceedings of the 10th ACM SIGOPS European Workshop: Beyond the PC, Saint-Emilion, France, 2002.","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[4] A. Zeigler. (2008, 2009, Jan 30). IE8 and Loosely-Coupled IE (LCIE) [Online]. Available: http:\/\/blogs.msdn.com\/ie\/archive\/2008\/03\/11\/ie8-and-loosely-coupled-ie-lcie.aspx","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[9] J. N. Herder, et al., \"Fault isolation for device drivers,\" in IEEE\/IFIP International Conference on Dependable Systems & Networks, 2009, pp. 33-42.","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[11] A. Barth, et al. (2008, 2009 Jan. 30). The Security Architecture of the Chromium Browser. Available: http:\/\/crypto.stanford.edu\/websec\/chromium\/","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[16] S. McCamant and G. Morrisett, \"Evaluating SFI for a CISC architecture,\" presented at the Proceedings of the 15th conference on USENIX Security Symposium, Vancouver, B.C., Canada, 2006.","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[19] C. Reis, et al., \"Using Processes to Improve the Reliability of Browser-based Applications,\" Department of Computer Science and Engineering, University of Washington, Technical Report UW-CSE-2007-12-01, 2007.","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[20] The Google Chrome Team. (2008, 2009, Jan 30). Chromium Developer Documentation: Multi-process Architecture [Online]. Available: http:\/\/dev.chromium.org\/developers\/design-documents\/multi-process-architecture","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[24] Intel, Intel 64 and IA-32 Architectures Software Developer's Manual vol. 1: Basic Architecture: Intel Corporation, 2007.","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[26] AMD. (2008, 2009 Jan. 30). AMD-V\u2122 Nested Paging [Online]. Available: http:\/\/developer.amd.com\/assets\/NPT-WP-1%201-final-TM.pdf","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[33] Intel. (2008, 25th May, 2011). Intel\u00ae Virtualization Technology [Online]. Available: http:\/\/www.intel.com\/technology\/virtualization\/index.htm","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[34] Redhat. (2010, 2010, Jul. 20). Kernel Based Virtual Machine [Online]. Available: http:\/\/www.linux-kvm.org\/page\/Main_Page","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[35] Google. (2009, 2010 Jul. 20). Native Client Security Contest [Online]. Available: http:\/\/code.google.com\/contests\/nativeclient-security\/","DOI":"10.1109\/DASC.2007.16"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"[36] J. LeVasseur, et al., \"Unmodified device driver reuse and improved system dependability via virtual machines,\" presented at the Proceedings of the 6th Symposium on Operating Systems Design & Implementation, San Francisco, CA, 2004.","DOI":"10.1109\/DASC.2007.16"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:59:43Z","timestamp":1497992383000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/7127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,1]]},"references-count":37,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2012,9,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.9.2107-2118","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,9,1]]}}}