{"id":"https://openalex.org/W2031806437","doi":"https://doi.org/10.1109/hpca.2013.6522323","title":"Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks","display_name":"Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks","publication_year":2013,"publication_date":"2013-02-01","ids":{"openalex":"https://openalex.org/W2031806437","doi":"https://doi.org/10.1109/hpca.2013.6522323","mag":"2031806437"},"language":"en","primary_location":{"id":"doi:10.1109/hpca.2013.6522323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpca.2013.6522323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026023746","display_name":"Yubin Xia","orcid":"https://orcid.org/0000-0001-6558-5298"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yubin Xia","raw_affiliation_strings":["Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422851","display_name":"Yutao Liu","orcid":"https://orcid.org/0009-0009-8562-4026"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yutao Liu","raw_affiliation_strings":["Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100406215","display_name":"Haibo Chen","orcid":"https://orcid.org/0000-0002-9720-0361"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Chen","raw_affiliation_strings":["Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026023746"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":16.3505,"has_fulltext":false,"cited_by_count":81,"citation_normalized_percentile":{"value":0.99083405,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"246","last_page":"257"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.9388200044631958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8452439904212952},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6822949051856995},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6651839017868042},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5775309801101685},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5476440787315369},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5472228527069092},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.45287948846817017},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.42670509219169617},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41602978110313416}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.9388200044631958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8452439904212952},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6822949051856995},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6651839017868042},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5775309801101685},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5476440787315369},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5472228527069092},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45287948846817017},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.42670509219169617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41602978110313416}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpca.2013.6522323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpca.2013.6522323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1978703818","https://openalex.org/W2000375627","https://openalex.org/W2005866432","https://openalex.org/W2027135600","https://openalex.org/W2036601091","https://openalex.org/W2043501224","https://openalex.org/W2074419584","https://openalex.org/W2096828726","https://openalex.org/W2106459643","https://openalex.org/W2107776555","https://openalex.org/W2108255910","https://openalex.org/W2111545894","https://openalex.org/W2112092704","https://openalex.org/W2114717105","https://openalex.org/W2118422164","https://openalex.org/W2119028650","https://openalex.org/W2122249806","https://openalex.org/W2125981962","https://openalex.org/W2131284883","https://openalex.org/W2133383336","https://openalex.org/W2135359801","https://openalex.org/W2140972824","https://openalex.org/W2149324048","https://openalex.org/W2150709728","https://openalex.org/W2151396176","https://openalex.org/W2153553074","https://openalex.org/W2160773001","https://openalex.org/W2162055502","https://openalex.org/W2162764933","https://openalex.org/W2165961102","https://openalex.org/W2175377689","https://openalex.org/W3140837477","https://openalex.org/W3148657381","https://openalex.org/W4206314719","https://openalex.org/W4230464498","https://openalex.org/W4234716962","https://openalex.org/W4244889001","https://openalex.org/W6651777752","https://openalex.org/W6657257018","https://openalex.org/W6669313848","https://openalex.org/W6675874582","https://openalex.org/W6677328203","https://openalex.org/W6682092840","https://openalex.org/W6838336854"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W2613320081","https://openalex.org/W1973516247","https://openalex.org/W2179519055","https://openalex.org/W2743348030","https://openalex.org/W2145292010","https://openalex.org/W2747005099","https://openalex.org/W2086039693"],"abstract_inverted_index":{"The":[0],"privacy":[1,104],"and":[2,21,59,87,105,116,124,134,158,179,194,206,224,237,258],"integrity":[3,106,135],"of":[4,12,41,76,107,217],"tenant's":[5,108],"data":[6,42,139],"highly":[7],"rely":[8],"on":[9,91,121,238,255,262],"the":[10,56,68,74,84,92,103,113,164,180,201,204,225,245,266],"infrastructure":[11],"multi-tenant":[13],"cloud":[14,31,57],"being":[15,23],"secure.":[16],"However,":[17],"with":[18,131,141,151],"both":[19],"hardware":[20,88,241,264],"software":[22,86],"controlled":[24],"by":[25,200],"potentially":[26],"curious":[27],"or":[28,44],"even":[29],"malicious":[30],"operators,":[32],"it":[33],"is":[34,248],"no":[35,118],"surprise":[36],"to":[37,55,137,163,203,253,260],"see":[38],"frequent":[39],"reports":[40],"leakages":[43],"abuses":[45],"in":[46,189,219,228],"cloud.":[47],"Unfortunately,":[48],"most":[49],"prior":[50,145],"solutions":[51],"require":[52],"intrusive":[53],"changes":[54,162],"platform":[58,242,257],"none":[60],"can":[61],"protect":[62],"a":[63,98,169,176,186,190,215,220,229,239],"VM":[64,78,178,187,202],"against":[65,80],"adversaries":[66,82],"controlling":[67,83],"physical":[69],"machine.":[70,231],"This":[71],"paper":[72,95],"analyzes":[73],"challenges":[75],"transparent":[77],"protection":[79],"sophisticated":[81],"whole":[85],"stack.":[89],"Based":[90],"analysis,":[93],"this":[94],"proposes":[96],"HyperCoffer,":[97],"hardware-software":[99],"framework":[100],"that":[101,173,244],"guards":[102],"VMs.":[109],"HyperCoffer":[110,148,167,218],"only":[111,195],"trusts":[112],"processor":[114,129],"chip":[115],"makes":[117],"security":[119],"assumption":[120],"external":[122,207],"memory":[123,132],"devices.":[125],"Hyper-Coffer":[126],"extends":[127],"existing":[128,152],"virtualization":[130],"encryption":[133],"checking":[136],"secure":[138],"communication":[140],"off-chip":[142],"memory.":[143],"Unlike":[144],"hardware-based":[146],"approaches,":[147],"retains":[149],"transparency":[150],"virtual":[153],"machines":[154],"(i.e.,":[155],"operating":[156],"systems)":[157],"requires":[159],"very":[160],"few":[161],"(untrusted)":[165],"hypervisor.":[166,181],"introduces":[168],"mechanism":[170,227],"called":[171],"VM-Shim":[172,183,226,267],"runs":[174,188],"in-between":[175],"guest":[177],"Each":[182],"instance":[184],"for":[185,265],"separate":[191],"protected":[192],"context":[193],"declassifies":[196],"necessary":[197],"information":[198],"designated":[199],"hypervisor":[205],"environments":[208],"(e.g.,":[209],"through":[210],"NICs).":[211],"We":[212],"have":[213],"implemented":[214],"prototype":[216],"QEMU-based":[221],"full-system":[222],"emulator":[223],"real":[230,240,263],"Performance":[232],"measurement":[233],"using":[234],"trace-based":[235],"simulation":[236],"shows":[243],"performance":[246],"overhead":[247],"small":[249],"(ranging":[250],"from":[251],"0.6%":[252],"13.9%":[254],"simulated":[256],"0.3%":[259],"6.8%":[261],"mechanism).":[268]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":14},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
