{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:46:27Z","timestamp":1729658787531,"version":"3.28.0"},"reference-count":70,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/sp.2014.27","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T09:57:47Z","timestamp":1416995867000},"page":"308-323","source":"Crossref","is-referenced-by-count":34,"title":["Dancing with Giants: Wimpy Kernels for On-Demand Isolated I\/O"],"prefix":"10.1109","author":[{"given":"Zongwei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Miao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Virgil D.","family":"Gligor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Removing the Dynamic Linker from the Security Kernel of a Computing Utility","year":"1974","author":"janson","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150987"},{"journal-title":"Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3 System Programming Guide","year":"2013","key":"33"},{"journal-title":"PCI-SIG SR-IOV Primer An Introduction to SR-IOV Technology","year":"2011","key":"34"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/32.106971"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"43","article-title":"Unmodified device driver reuse and improved system dependability via virtual machines","author":"levasseur","year":"2004","journal-title":"Proc Symposium on Operating Systems Design and Implementation"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-005-0654-4"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-21821-1_21"},{"journal-title":"Intel Insider What is It? (is It DRM? And Yes It Delivers Top Quality Movies to Your PC)","year":"2013","author":"knupffer","key":"40"},{"key":"67","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-68979-9_6","article-title":"The zurich trusted information channel - An efficient defence against man-in-the-middle and malicious software attacks","author":"weigold","year":"2008","journal-title":"Proc International Conference on Trusted Computing and Trust in Information Technologies Trusted Computing - Challenges and Applications"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.42"},{"key":"68","article-title":"Device driver safety through a reference validation mechanism","author":"williams","year":"2008","journal-title":"Proc USENIX Conference on Operating Systems Design and Implementation"},{"key":"22","article-title":"Safe hardware access with the xen virtual machine monitor","author":"fraser","year":"2004","journal-title":"Proc Workshop on Operating System and Architectural Support for the on Demand IT Infra Structure (OASIS)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346303"},{"key":"24","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"2010","journal-title":"Proc of CRYPTO"},{"key":"25","article-title":"Security limitations of virtualization and how to overcome them","author":"gligor","year":"2010","journal-title":"Proc International Workshop on Security Protocols Cambridge University"},{"key":"26","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1109\/TSE.1979.230196","article-title":"object migration and authentication","volume":"se 5","author":"gligor","year":"1979","journal-title":"IEEE Transactions on Software Engineering"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10017"},{"journal-title":"Integrity-178b Separation Kernel Security Target","year":"2010","key":"28"},{"journal-title":"TPM Specification Version 1 2","year":"2009","key":"29"},{"journal-title":"Seabios","year":"2013","key":"3"},{"journal-title":"Gnu pth - the gnu portable threads","year":"2014","key":"2"},{"journal-title":"EXtensible Modular Hypervisor Framework","year":"2014","key":"1"},{"journal-title":"AMD 64 Architecture Programmer's Manual Volume 2 System Programming","year":"2013","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"journal-title":"AMD I\/O Virtualization Technology (IOMMU) Specification","year":"2009","key":"6"},{"journal-title":"Enhanced Host Controller Interface Specification for Universal Serial Bus","year":"2002","key":"5"},{"journal-title":"Intel Virtualization Technology for Directed I\/O Architecture Specification","year":"2013","key":"32"},{"journal-title":"Universal Serial Bus Specification","year":"2000","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_1"},{"key":"9","article-title":"Software inspection using codesurfer","author":"anderson","year":"2001","journal-title":"The 1st Workshop on Inspection in Software Engineering"},{"key":"8","article-title":"Computer security technology planning study","volume":"2","author":"anderson","year":"1972","journal-title":"Technical Report ESD-TR-73-51"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1145\/800214.806546"},{"key":"57","article-title":"Designing the GEMSOS security kernel for security and performance","author":"schell","year":"1985","journal-title":"Proc National Computer Security Conference"},{"journal-title":"Protecting Critical Applications on Mobile Platforms","year":"2009","author":"sahita","key":"56"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10011"},{"key":"55","first-page":"12","volume":"15","author":"rushby","year":"1981","journal-title":"Design and Verification of Secure Systems"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2516951.2505123"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043575"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_2"},{"key":"16","article-title":"Appshield: Protecting applications against untrusted operating system","author":"cheng","year":"2013","journal-title":"Technical Report SMU-SIS-13-101"},{"key":"13","article-title":"Tamper-resistant execution in an untrusted operating system using a virtual machine monitor","author":"chen","year":"2007","journal-title":"Technical Report FDUPPITR-2007-0801"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"12","article-title":"Tolerating malicious device drivers in linux","author":"boyd-wickizer","year":"2010","journal-title":"Proc USENIX Annual Technical Conference"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958202"},{"key":"20","first-page":"251","volume":"29","author":"engler","year":"1995","journal-title":"Exokernel An Operating System Architecture for Application-Level Resource Management"},{"journal-title":"Wind River Vxworks Mils Platform","year":"2013","key":"64"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"key":"62","doi-asserted-by":"crossref","DOI":"10.1145\/2382196.2382200","article-title":"Fides: Selectively hardening software application components against kernel-level or processlevel malware","author":"strackx","year":"2012","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"63","doi-asserted-by":"crossref","DOI":"10.1145\/1165389.945466","article-title":"Improving the reliability of commodity operating systems","author":"swift","year":"2003","journal-title":"Proc ACM Symposium on Operating Systems Principles"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508311"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"49","article-title":"Safe passage for passwords and other sensitive data","author":"mccune","year":"2009","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"45","first-page":"26","article-title":"Lessons from VAX\/SVS for high assurance VM systems","volume":"10","author":"lipner","year":"2012","journal-title":"IEEE Security and Privacy"},{"key":"44","article-title":"Minibox: A two-way sandbox for x86 native code","author":"li","year":"2014","journal-title":"Technical Report CMU-CyLab-14-001"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"46","article-title":"High performance VMM-bypass I\/O in virtual machines","author":"liu","year":"2006","journal-title":"Proc USENIX Annual Technical Conference"},{"journal-title":"Security Target","year":"2004","key":"10"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522719"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"53","article-title":"NGSCB: A trusted open system","author":"peinado","year":"2004","journal-title":"Proc Australasian Conference on Information Security and Privacy"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950399"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"}],"event":{"name":"2014 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2014,5,18]]},"location":"San Jose, CA","end":{"date-parts":[[2014,5,21]]}},"container-title":["2014 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6954656\/6956545\/06956572.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954656\/6956545\/06956572.pdf?arnumber=6956572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T04:29:20Z","timestamp":1690691360000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/sp.2014.27","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}