{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:16:54Z","timestamp":1726003014994},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050504"},{"type":"electronic","value":"9783030050511"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05051-1_28","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T16:38:48Z","timestamp":1544114328000},"page":"406-420","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controlled Channel Attack Detection Based on Hardware Virtualization"],"prefix":"10.1007","author":[{"given":"Chenyi","family":"Qiang","sequence":"first","affiliation":[]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rongwei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"28_CR1","unstructured":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual. \n http:\/\/www.intel.com\/content\/www\/us\/en\/processors\/architectures-software-developer-manuals.html"},{"key":"28_CR2","unstructured":"Intel software guard extensions programming reference (rev2). \n https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"28_CR3","unstructured":"SGX Tutorial. \n http:\/\/sgxisca.weebly.com\/"},{"key":"28_CR4","unstructured":"UnixBench Benchmark. \n https:\/\/github.com\/kdlucas\/byte-unixbench"},{"issue":"3","key":"28_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. (TOCS) 33(3), 8 (2015)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"28_CR6","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX Annual Technical Conference, FREENIX Track, vol. 41, p. 46 (2005)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Shacham, H.: Iago attacks: Why the system call API is a bad untrusted RPC interface. In: Eighteenth International Conference on Architectural Support for Programming Languages & Operating Systems, pp. 253\u2013264 (2013)","DOI":"10.1145\/2499368.2451145"},{"issue":"2","key":"28_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1353535.1346284","volume":"42","author":"X Chen","year":"2008","unstructured":"Chen, X., et al.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Oper. Syst. Rev. 42(2), 2\u201313 (2008)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 51\u201362. ACM (2008)","DOI":"10.1145\/1455770.1455779"},{"key":"28_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-16161-2_10","volume-title":"Security and Privacy in Communication Networks","author":"M Grace","year":"2010","unstructured":"Grace, M., et al.: Transparent protection of commodity OS kernels using hardware virtualization. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 162\u2013180. Springer, Heidelberg (2010). \n https:\/\/doi.org\/10.1007\/978-3-642-16161-2_10"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: InkTag: secure applications on an untrusted operating system. In: ACM SIGARCH Computer Architecture News, vol. 41, pp. 265\u2013278. ACM (2013)","DOI":"10.1145\/2499368.2451146"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"King, S.T., Chen, P.M.: SubVirt: implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy, pp. 14\u2013pp. IEEE (2006)","DOI":"10.1109\/SP.2006.38"},{"key":"28_CR13","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: the Linux virtual machine monitor. In: Proceedings of the Linux symposium, vol. 1, pp. 225\u2013230 (2007)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Maas, M., et al.: Phantom: practical oblivious computation in a secure processor. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 311\u2013324. ACM (2013)","DOI":"10.1145\/2508859.2516692"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen, A.M., Schear, N., Jung, H., Godiyal, A., King, S.T., Nguyen, H.D.: MAVMM: lightweight and purpose built VMM for malware analysis. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 441\u2013450. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.48"},{"key":"28_CR16","unstructured":"Rane, A., Lin, C., Tiwari, M.: Raccoon: closing digital side-channels through obfuscated execution. In: USENIX Security Symposium, pp. 431\u2013446 (2015)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Shih, M.W., Lee, S., Kim, T., Peinado, M.: T-SGX: eradicating controlled-channel attacks against enclave programs. In: Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA (2017)","DOI":"10.14722\/ndss.2017.23193"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Shinde, S., Chua, Z.L., Narayanan, V., Saxena, P.: Preventing page faults from telling your secrets. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 317\u2013328. ACM (2016)","DOI":"10.1145\/2897845.2897885"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Wu, R., Chen, P., Liu, P., Mao, B.: System call redirection: a practical approach to meeting real-world virtual machine introspection needs. In: 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 574\u2013585. IEEE (2014)","DOI":"10.1109\/DSN.2014.59"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Y., Cui, W., Peinado, M.: Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 640\u2013656. IEEE (2015)","DOI":"10.1109\/SP.2015.45"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Reiter, M.K., Zhang, Y.: A software approach to defeating side channels in last-level caches. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 871\u2013882. ACM (2016)","DOI":"10.1145\/2976749.2978324"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05051-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:20:57Z","timestamp":1558329657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05051-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050504","9783030050511"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05051-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}