{"id":"https://openalex.org/W3038288694","doi":"https://doi.org/10.1587/transinf.2019edp7186","title":"Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors","display_name":"Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3038288694","doi":"https://doi.org/10.1587/transinf.2019edp7186","mag":"3038288694"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2019edp7186","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019edp7186","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019EDP7186/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019EDP7186/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079100952","display_name":"Kenta Ishiguro","orcid":"https://orcid.org/0000-0003-0302-1600"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kenta ISHIGURO","raw_affiliation_strings":["Department of Information and Computer Science, Keio University"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, Keio University","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100658539","display_name":"Kenji Kono","orcid":"https://orcid.org/0000-0002-8650-9822"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kenji KONO","raw_affiliation_strings":["Department of Information and Computer Science, Keio University"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, Keio University","institution_ids":["https://openalex.org/I203951103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079100952"],"corresponding_institution_ids":["https://openalex.org/I203951103"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07062028,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"E103.D","issue":"7","first_page":"1660","last_page":"1671"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.9062610864639282},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8366515636444092},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.7345063090324402},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.7287863492965698},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6948519349098206},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.580614447593689},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5633359551429749},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5322936177253723},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.528656005859375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4869914948940277},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4406065344810486},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.400188148021698},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3862171173095703},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2600955367088318},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.24745267629623413}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.9062610864639282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8366515636444092},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.7345063090324402},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.7287863492965698},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6948519349098206},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.580614447593689},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5633359551429749},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5322936177253723},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.528656005859375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4869914948940277},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4406065344810486},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.400188148021698},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3862171173095703},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2600955367088318},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.24745267629623413},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2019edp7186","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019edp7186","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019EDP7186/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2019edp7186","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2019edp7186","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E103.D/7/E103.D_2019EDP7186/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G1069223013","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G1755812565","display_name":null,"funder_award_id":"Japan Science and Technology Agency","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G193038087","display_name":null,"funder_award_id":"JST CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2184385417","display_name":"Avoiding Legacy Code Execution to Improve Hypervisor Security","funder_award_id":"19K11906","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2521286739","display_name":null,"funder_award_id":"CREST","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G2792802287","display_name":null,"funder_award_id":"KAKENHI","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3282004645","display_name":null,"funder_award_id":"JPMJCR","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3960735740","display_name":null,"funder_award_id":"JPMJCR19F3","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G4509772848","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G4611969921","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G4636223006","display_name":null,"funder_award_id":"JSPS KAK","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4864544293","display_name":null,"funder_award_id":"Japan","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G6362425154","display_name":null,"funder_award_id":"KAKENHI","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G6718509927","display_name":null,"funder_award_id":"CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G7485138276","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G7752643416","display_name":null,"funder_award_id":"Japan","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320334789","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19"},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3038288694.pdf","grobid_xml":"https://content.openalex.org/works/W3038288694.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1604135736","https://openalex.org/W2012001609","https://openalex.org/W2018325363","https://openalex.org/W2100678175","https://openalex.org/W2122913395","https://openalex.org/W2131861721","https://openalex.org/W2133592286","https://openalex.org/W2135359801","https://openalex.org/W2149886445","https://openalex.org/W2405267032","https://openalex.org/W2603588015","https://openalex.org/W2772310277","https://openalex.org/W2795123325","https://openalex.org/W4252834746"],"related_works":["https://openalex.org/W2393767428","https://openalex.org/W2974258286","https://openalex.org/W1979469929","https://openalex.org/W2550565492","https://openalex.org/W2150403335","https://openalex.org/W1546317334","https://openalex.org/W1518891319","https://openalex.org/W2065751263","https://openalex.org/W3038288694","https://openalex.org/W2795123325"],"abstract_inverted_index":{"Vulnerabilities":[0,36],"in":[1,5,15,31,37,84],"hypervisors":[2,59],"are":[3,40],"crucial":[4],"multi-tenant":[6],"clouds":[7],"and":[8],"attractive":[9],"for":[10],"attackers":[11],"because":[12],"a":[13,49,72],"vulnerability":[14],"the":[16,21,85],"hypervisor":[17],"can":[18],"undermine":[19],"all":[20],"virtual":[22],"machine":[23],"(VM)":[24],"security.":[25],"This":[26,68],"paper":[27],"focuses":[28],"on":[29],"vulnerabilities":[30,83],"instruction":[32,38],"emulators":[33,39],"inside":[34],"hypervisors.":[35],"not":[41],"rare;":[42],"CVE-2017-2583,":[43],"CVE-2016-9756,":[44],"CVE-2015-0239,":[45],"CVE-2014-3647,":[46],"to":[47,71,79],"name":[48],"few.":[50],"For":[51],"backward":[52],"compatibility":[53],"with":[54],"legacy":[55],"x86":[56],"CPUs,":[57],"conventional":[58],"emulate":[60],"arbitrary":[61],"instructions":[62],"at":[63],"any":[64],"time":[65],"if":[66],"requested.":[67],"design":[69],"leads":[70],"large":[73],"attack":[74],"surface,":[75],"making":[76],"it":[77],"hard":[78],"get":[80],"rid":[81],"of":[82],"emulator.":[86]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
