{"id":"https://openalex.org/W4290996267","doi":"https://doi.org/10.1109/icc45855.2022.9839069","title":"Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform","display_name":"Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4290996267","doi":"https://doi.org/10.1109/icc45855.2022.9839069"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839069","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839069","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011962388","display_name":"Qihang Zhou","orcid":"https://orcid.org/0000-0002-8565-1923"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qihang Zhou","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering","Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015456692","display_name":"Xiaoqi Jia","orcid":"https://orcid.org/0000-0002-8376-3235"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqi Jia","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering","Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101850593","display_name":"Nan Jiang","orcid":"https://orcid.org/0000-0003-4913-4395"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Jiang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering","School of Cyber Security, University of Chinese Academy of Sciences","Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011962388"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1039,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.27494075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"5451","last_page":"5456"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.9241682291030884},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.8127292990684509},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7618261575698853},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7291085720062256},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6620677709579468},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6442322731018066},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.5142461657524109},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5115559697151184},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4693145751953125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4655602276325226},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.45702478289604187},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.45137467980384827},{"id":"https://openalex.org/keywords/booting","display_name":"Booting","score":0.44628143310546875},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.42650866508483887},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2055818736553192}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.9241682291030884},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.8127292990684509},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7618261575698853},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7291085720062256},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6620677709579468},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6442322731018066},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.5142461657524109},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5115559697151184},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4693145751953125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4655602276325226},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.45702478289604187},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.45137467980384827},{"id":"https://openalex.org/C504728807","wikidata":"https://www.wikidata.org/wiki/Q180256","display_name":"Booting","level":2,"score":0.44628143310546875},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.42650866508483887},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2055818736553192}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839069","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839069","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W161166442","https://openalex.org/W1247015877","https://openalex.org/W2031806437","https://openalex.org/W2043501224","https://openalex.org/W2095881341","https://openalex.org/W2101889913","https://openalex.org/W2133592286","https://openalex.org/W2144642151","https://openalex.org/W2150615820","https://openalex.org/W2150709728","https://openalex.org/W2158699246","https://openalex.org/W2578546025","https://openalex.org/W2751274652","https://openalex.org/W2795123325","https://openalex.org/W2795294395","https://openalex.org/W3009707792","https://openalex.org/W3159547072","https://openalex.org/W4240658150","https://openalex.org/W6627928013","https://openalex.org/W6658514009","https://openalex.org/W6731813714","https://openalex.org/W6743710834","https://openalex.org/W6795027149"],"related_works":["https://openalex.org/W2369615049","https://openalex.org/W2393767428","https://openalex.org/W1979469929","https://openalex.org/W2550565492","https://openalex.org/W2215363399","https://openalex.org/W3022996360","https://openalex.org/W2150403335","https://openalex.org/W1546317334","https://openalex.org/W2065751263","https://openalex.org/W2062201771"],"abstract_inverted_index":{"In":[0,56],"cloud":[1,35],"computing,":[2],"the":[3,17,29,70,74,81,92,95,100,104,107,111,120,137,142,162],"confidentiality":[4,163],"and":[5,52,109,128,139,164,178],"integrity":[6,165],"of":[7,16,32,94,106,141,166,174],"virtual":[8,129,167],"machines":[9,168],"(VMs)":[10],"are":[11],"facing":[12],"severe":[13],"threats":[14],"because":[15],"huge":[18],"trusted":[19],"computing":[20,36],"base":[21],"(TCB)":[22],"software":[23,47,176],"stack":[24],"in":[25,34],"virtualization":[26,65],"layer.":[27],"With":[28],"increasing":[30],"momentum":[31],"ARM64":[33,75],"server":[37],"markets,":[38],"it":[39],"is":[40],"important":[41],"to":[42,79],"protect":[43,161],"VMs":[44,85],"from":[45,103,113],"privileged":[46,88],"(including":[48],"host":[49],"operating":[50],"system":[51],"hypervisor)":[53],"on":[54,91,149],"ARM64.":[55],"this":[57],"paper,":[58],"we":[59],"have":[60,146],"created":[61],"SecureHyp,":[62],"a":[63],"new":[64],"platform":[66],"design":[67],"for":[68],"refactoring":[69],"existing":[71],"hypervisor":[72,108,112],"using":[73,123],"hardware":[76],"security":[77,138],"mechanisms":[78],"reduce":[80],"TCB":[82,177],"while":[83],"protecting":[84],"against":[86],"untrusted":[87],"software.":[89],"Based":[90],"principle":[93],"least":[96],"privilege,":[97],"SecureHyp":[98,134,148,159],"separates":[99],"sensitive-resource":[101],"management":[102],"rights":[105],"prohibits":[110],"accessing":[114],"specific":[115],"sensitive":[116],"resources.":[117],"By":[118],"deploying":[119],"memory":[121],"isolation":[122],"ARM":[124],"Trusted":[125],"Firmware":[126],"(ATF)":[127],"Memory":[130],"Management":[131],"Unit":[132],"(vMMU),":[133],"ensures":[135],"both":[136],"efficiency":[140],"guest":[143],"VMs.":[144],"We":[145],"implemented":[147],"Linux":[150],"firefly-4.4.194":[151],"with":[152,169],"modest":[153],"modification.":[154],"The":[155],"results":[156],"show":[157],"that":[158],"can":[160],"only":[170],"around":[171],"2000":[172],"lines":[173],"code":[175],"negligible":[179],"performance":[180],"overhead.":[181]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
