{"id":"https://openalex.org/W3211385142","doi":"https://doi.org/10.1145/3460120.3485253","title":"CrossLine: Breaking \"Security-by-Crash\" based Memory Isolation in AMD SEV","display_name":"CrossLine: Breaking \"Security-by-Crash\" based Memory Isolation in AMD SEV","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3211385142","doi":"https://doi.org/10.1145/3460120.3485253","mag":"3211385142"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3485253","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3485253","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3485253","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3485253","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100415393","display_name":"Mengyuan Li","orcid":"https://orcid.org/0000-0001-5526-3228"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengyuan Li","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026864098","display_name":"Zhiqiang Lin","orcid":"https://orcid.org/0000-0001-6527-5994"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Lin","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100415393"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":3.0792,"has_fulltext":true,"cited_by_count":41,"citation_normalized_percentile":{"value":0.92899454,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2937","last_page":"2950"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7967524528503418},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6534357666969299},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6258267760276794},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.6113196611404419},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.451621949672699},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.3078458905220032},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.19764631986618042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7967524528503418},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6534357666969299},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6258267760276794},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.6113196611404419},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.451621949672699},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.3078458905220032},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.19764631986618042}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460120.3485253","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3485253","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3485253","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3460120.3485253","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3485253","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3485253","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4025480908","display_name":"SDI-CSCS: Collaborative Research: S2OS Enabling Infrastructure-Wide Programmable Security with SDI","funder_award_id":"1834216","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7494742147","display_name":null,"funder_award_id":"750809, 1834213, and 1834216","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8874117807","display_name":"TWC: Medium: Collaborative: Systems, Tools, and Techniques for Executing, Managing, and Securing SGX Programs","funder_award_id":"1834213","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3211385142.pdf"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W2151849720","https://openalex.org/W2162800072","https://openalex.org/W2559981079","https://openalex.org/W2752929869","https://openalex.org/W2770869942","https://openalex.org/W2795160257","https://openalex.org/W2907416151","https://openalex.org/W2959284240","https://openalex.org/W2963311060","https://openalex.org/W2982848142","https://openalex.org/W3102688521","https://openalex.org/W3103974952","https://openalex.org/W6753443810"],"related_works":["https://openalex.org/W4241166160","https://openalex.org/W2796290234","https://openalex.org/W2799095291","https://openalex.org/W2470663080","https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1965252149","https://openalex.org/W1973516247","https://openalex.org/W1991063492","https://openalex.org/W2102844359"],"abstract_inverted_index":{"AMD's":[0,143],"Secure":[1],"Encrypted":[2],"Virtualization":[3],"(SEV)":[4],"is":[5],"an":[6,29,78],"emerging":[7],"security":[8],"feature":[9],"of":[10,39,47,68,87,99,116,131,139],"modern":[11],"AMD":[12],"processors":[13],"that":[14,72,86],"allows":[15],"virtual":[16],"machines":[17],"to":[18,50,76,85,91,113],"run":[19],"with":[20,28],"encrypted":[21,51],"memory":[22,52,110],"and":[23,56,81,125,146],"perform":[24],"confidential":[25],"computing":[26],"even":[27],"untrusted":[30],"hypervisor.":[31],"This":[32],"paper":[33],"first":[34],"demystifies":[35],"SEV's":[36],"improper":[37],"use":[38],"address":[40],"space":[41],"identifier":[42],"(ASID)":[43],"for":[44],"controlling":[45],"accesses":[46],"a":[48,65,117],"VM":[49,80,90],"pages,":[53],"cache":[54],"lines,":[55],"TLB":[57],"entries.":[58],"We":[59,95,135],"then":[60],"present":[61,96],"the":[62,74,88,93,114,132,137],"CROSSLINE":[63,100,102,121,140],"attacks,":[64],"novel":[66],"class":[67],"attacks":[69,141],"against":[70],"SEV":[71],"allow":[73],"adversary":[75],"launch":[77],"attacker":[79],"change":[82],"its":[83],"ASID":[84],"victim":[89,133],"impersonate":[92],"victim.":[94],"two":[97],"variants":[98],"attacks:":[101],"V1":[103],"decrypts":[104],"victim's":[105],"page":[106,118],"tables":[107],"or":[108],"any":[109],"blocks":[111],"conforming":[112],"format":[115],"table":[119],"entry;":[120],"V2":[122],"constructs":[123],"encryption":[124],"decryption":[126],"oracles":[127],"by":[128],"executing":[129],"instructions":[130],"VM.":[134],"discuss":[136],"applicability":[138],"on":[142],"SEV,":[144],"SEV-ES,":[145],"SEV-SNP":[147],"processors.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
