{"id":"https://openalex.org/W2597496014","doi":"https://doi.org/10.1145/3029806.3029810","title":"All Your VMs are Disconnected","display_name":"All Your VMs are Disconnected","publication_year":2017,"publication_date":"2017-03-20","ids":{"openalex":"https://openalex.org/W2597496014","doi":"https://doi.org/10.1145/3029806.3029810","mag":"2597496014"},"language":"en","primary_location":{"id":"doi:10.1145/3029806.3029810","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030073853","display_name":"Zhe Zhou","orcid":"https://orcid.org/0000-0003-4879-6258"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhe Zhou","raw_affiliation_strings":["Chinese University of Hong Kong, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100452308","display_name":"Zhou Li","orcid":"https://orcid.org/0000-0002-9401-1012"},"institutions":[{"id":"https://openalex.org/I1321014770","display_name":"Association for Computing Machinery","ror":"https://ror.org/03wsadn68","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1321014770"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhou Li","raw_affiliation_strings":["ACM Member, New York, USA"],"affiliations":[{"raw_affiliation_string":"ACM Member, New York, USA","institution_ids":["https://openalex.org/I1321014770"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008237643","display_name":"Kehuan Zhang","orcid":"https://orcid.org/0000-0003-1519-0057"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kehuan Zhang","raw_affiliation_strings":["Chinese University of Hong Kong &amp; CUHK Shenzhen Research Institute, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Chinese University of Hong Kong &amp; CUHK Shenzhen Research Institute, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I4210116924"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030073853"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.59249742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"249","last_page":"260"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.8899793028831482},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.8790850639343262},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7861126661300659},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7316092848777771},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.605202853679657},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5924110412597656},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.49909019470214844},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.48015421628952026},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.46711409091949463},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4423365294933319},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4306563436985016},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3590783476829529},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3457161784172058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30645936727523804},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13302305340766907}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8899793028831482},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.8790850639343262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7861126661300659},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7316092848777771},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.605202853679657},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5924110412597656},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.49909019470214844},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.48015421628952026},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.46711409091949463},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4423365294933319},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4306563436985016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3590783476829529},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3457161784172058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30645936727523804},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13302305340766907},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3029806.3029810","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3029806.3029810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4138485066","display_name":null,"funder_award_id":"24207815","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"},{"id":"https://openalex.org/G6822108733","display_name":null,"funder_award_id":"61572415","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W152792243","https://openalex.org/W1583301963","https://openalex.org/W1829813581","https://openalex.org/W2012752667","https://openalex.org/W2039997795","https://openalex.org/W2059028787","https://openalex.org/W2082615565","https://openalex.org/W2090076638","https://openalex.org/W2096165352","https://openalex.org/W2133119226","https://openalex.org/W2150231791","https://openalex.org/W2152132676","https://openalex.org/W2165666960","https://openalex.org/W2165890524","https://openalex.org/W2194048068","https://openalex.org/W2238149288","https://openalex.org/W2333015371","https://openalex.org/W2748876531","https://openalex.org/W4245884216"],"related_works":["https://openalex.org/W2021257679","https://openalex.org/W2005435933","https://openalex.org/W2017036943","https://openalex.org/W2179519055","https://openalex.org/W2549930939","https://openalex.org/W2747005099","https://openalex.org/W2050621158","https://openalex.org/W1775827617","https://openalex.org/W2761289806","https://openalex.org/W2102844359"],"abstract_inverted_index":{"Single":[0],"Root":[1],"I/O":[2,30],"Virtualization":[3],"(SRIOV)":[4],"allows":[5],"one":[6],"physical":[7],"device":[8],"to":[9,34,52],"be":[10],"used":[11],"by":[12,67],"multiple":[13],"virtual":[14],"machines":[15],"simultaneously":[16],"without":[17],"the":[18,21,27,39,55,58,62,68],"mediation":[19],"from":[20],"hypervisor.":[22],"Such":[23],"technique":[24],"significantly":[25],"decreases":[26],"overhead":[28],"of":[29,57],"virtualization.":[31],"But":[32],"according":[33],"our":[35],"latest":[36],"findings,":[37],"in":[38],"meantime,":[40],"it":[41],"introduces":[42],"a":[43],"high-risk":[44],"security":[45],"issue":[46],"that":[47],"enables":[48],"an":[49],"adversary-controlled":[50],"VM":[51],"cut":[53],"off":[54],"connectivity":[56],"host":[59],"machine,":[60],"given":[61],"limited":[63],"filtering":[64],"capabilities":[65],"provided":[66],"SRIOV":[69],"devices.":[70]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
