{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:05:15Z","timestamp":1725725115151},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:00:00Z","timestamp":1490400000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Air Force Rome Labs","award":["CA01160915BINGU"]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1527338, 1320689"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2892242.2892254","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"79-92","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enabling Efficient Hypervisor-as-a-Service Clouds with Ephemeral Virtualization"],"prefix":"10.1145","author":[{"given":"Dan","family":"Williams","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Yaohui","family":"Hu","sequence":"additional","affiliation":[{"name":"Binghamton University, Binghamton, NY, USA"}]},{"given":"Umesh","family":"Deshpande","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Piush K.","family":"Sinha","sequence":"additional","affiliation":[{"name":"Binghamton University, Binghamton, NY, USA"}]},{"given":"Nilton","family":"Bila","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Kartik","family":"Gopalan","sequence":"additional","affiliation":[{"name":"Binghamton University, Binghamton, NY, USA"}]},{"given":"Hani","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown Heights, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMD Virtualization (AMD-V). http:\/\/www.amd.com\/us\/solutions\/servers\/virtualization. AMD Virtualization (AMD-V). http:\/\/www.amd.com\/us\/solutions\/servers\/virtualization."},{"volume-title":"Proc. of Linux Symposium","year":"2009","author":"Arcangeli A.","key":"e_1_3_2_1_2_1","unstructured":"A. Arcangeli , I. Eidus , and C. Wright . Increasing memory density by using ksm . In Proc. of Linux Symposium , Ottawa, Canada , July 2009 . A. Arcangeli, I. Eidus, and C. Wright. Increasing memory density by using ksm. In Proc. of Linux Symposium, Ottawa, Canada, July 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-79737-8_4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806526"},{"volume-title":"Proc. of USENIX OSDI","year":"2010","author":"Ben-Yehuda M.","key":"e_1_3_2_1_5_1","unstructured":"M. Ben-Yehuda , M. D. Day , Z. Dubitzky , M. Factor , N. Har'El , A. Gordon , A. Liguori , O. Wasserman , and B.-A. Yassour . The turtles project: Design and implementation of nested virtualization . In Proc. of USENIX OSDI , Vancouver, Canada , Oct. 2010 . M. Ben-Yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B.-A. Yassour. The turtles project: Design and implementation of nested virtualization. In Proc. of USENIX OSDI, Vancouver, Canada, Oct. 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382226"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134767"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2007.54"},{"volume-title":"Proc. of USENIX NSDI","year":"2005","author":"Clark C.","key":"e_1_3_2_1_9_1","unstructured":"C. Clark , K. Fraser , S. Hand , J. G. Hansen , E. Jul , C. Limpach , I. Pratt , and A. Warfield . Live Migration of Virtual Machines . In Proc. of USENIX NSDI , Boston, MA , May 2005 . C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live Migration of Virtual Machines. In Proc. of USENIX NSDI, Boston, MA, May 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043575"},{"volume-title":"Proc. of USENIX NSDI","year":"2008","author":"Cully B.","key":"e_1_3_2_1_11_1","unstructured":"B. Cully , G. Lefebvre , D. Meyer , M. Feeley , N. Hutchinson , and A. Warfield . Remus: high availability via asynchronous virtual machine replication . In Proc. of USENIX NSDI , San Francisco, CA , Apr. 2008 . B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: high availability via asynchronous virtual machine replication. In Proc. of USENIX NSDI, San Francisco, CA, Apr. 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060309"},{"volume-title":"Microkernels meet recursive virtual machines. In Proc. of USENIX OSDI","year":"1996","author":"Ford B.","key":"e_1_3_2_1_14_1","unstructured":"B. Ford , M. Hibler , J. Lepreau , P. Tullmann , G. Back , and S. Clawson . Microkernels meet recursive virtual machines. In Proc. of USENIX OSDI , Seattle, WA , Oct. 1996 . B. Ford, M. Hibler, J. Lepreau, P. Tullmann, G. Back, and S. Clawson. Microkernels meet recursive virtual machines. In Proc. of USENIX OSDI, Seattle, WA, Oct. 1996."},{"volume-title":"Proc. of NDSS Symposium","year":"2003","author":"Garfinkel T.","key":"e_1_3_2_1_15_1","unstructured":"T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Proc. of NDSS Symposium , San Diego, CA , Feb. 2003 . T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proc. of NDSS Symposium, San Diego, CA, Feb. 2003."},{"volume-title":"Linux Plumbers Conference","year":"2009","author":"Graf A.","key":"e_1_3_2_1_16_1","unstructured":"A. Graf and J. Roedel . Nesting the virtualized world . In Linux Plumbers Conference , Portland, OR , Sept. 2009 . A. Graf and J. Roedel. Nesting the virtualized world. In Linux Plumbers Conference, Portland, OR, Sept. 2009."},{"volume-title":"Proc. of USENIX OSDI","year":"2008","author":"Gupta D.","key":"e_1_3_2_1_17_1","unstructured":"D. Gupta , S. Lee , M. Vrable , S. Savage , A. C. Snoeren , G. Varghese , G. M. Voelker , and A. Vahdat . Difference engine: Harnessing memory redundancy in virtual machines . In Proc. of USENIX OSDI , San Diego, CA , Dec. 2008 . D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren, G. Varghese, G. M. Voelker, and A. Vahdat. Difference engine: Harnessing memory redundancy in virtual machines. In Proc. of USENIX OSDI, San Diego, CA, Dec. 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508301"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_20_1","unstructured":"Intel 64 and IA-32 Architectures. Software Developer's Manual Combined Volumes: 1 2A 2B 2C 3A 3B 3C and 3D. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/manuals\/64-ia-32-architectures-software-developer-manual-325462.pdf. Intel 64 and IA-32 Architectures. Software Developer's Manual Combined Volumes: 1 2A 2B 2C 3A 3B 3C and 3D. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/manuals\/64-ia-32-architectures-software-developer-manual-325462.pdf."},{"volume-title":"Proc. of Linux Symposium","year":"2007","author":"Kivity A.","key":"e_1_3_2_1_21_1","unstructured":"A. Kivity , Y. Kamay , D. Laor , U. Lublin , and A. Liguori . KVM: the linux virtual machine monitor . In Proc. of Linux Symposium , Ottawa, Canada , June 2007 . A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. KVM: the linux virtual machine monitor. In Proc. of Linux Symposium, Ottawa, Canada, June 2007."},{"key":"e_1_3_2_1_22_1","unstructured":"C. Kolivas. Kernbench: http:\/\/ck.kolivas.org\/apps\/kernbench\/kernbench-0.50\/. C. Kolivas. Kernbench: http:\/\/ck.kolivas.org\/apps\/kernbench\/kernbench-0.50\/."},{"volume-title":"Proc. of USENIX HOTOS","year":"2011","author":"Kooburat T.","key":"e_1_3_2_1_23_1","unstructured":"T. Kooburat and M. Swift . The best of both worlds with on-demand virtualization . In Proc. of USENIX HOTOS , Napa, CA , May 2011 . T. Kooburat and M. Swift. The best of both worlds with on-demand virtualization. In Proc. of USENIX HOTOS, Napa, CA, May 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064979.1065006"},{"key":"e_1_3_2_1_25_1","unstructured":"J. Levon. OProfile: System-wide profiler for Linux systems http:\/\/oprofile.sourceforge.net\/about\/. J. Levon. OProfile: System-wide profiler for Linux systems http:\/\/oprofile.sourceforge.net\/about\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024419"},{"volume-title":"Shared-memory optimizations for virtual machines. D thesis","year":"2011","author":"Macdonell A. C.","key":"e_1_3_2_1_27_1","unstructured":"A. C. Macdonell . Shared-memory optimizations for virtual machines. D thesis , University of Alberta , Edmonton, Canada , 2011 . A. C. Macdonell. Shared-memory optimizations for virtual machines. D thesis, University of Alberta, Edmonton, Canada, 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"volume-title":"KVM Forum","year":"2013","author":"Natapov G.","key":"e_1_3_2_1_29_1","unstructured":"G. Natapov . Nested EPT to make nested VMX faster . In KVM Forum , Edinburgh, UK , Oct. 2013 . G. Natapov. Nested EPT to make nested VMX faster. In KVM Forum, Edinburgh, UK, Oct. 2013."},{"key":"e_1_3_2_1_30_1","unstructured":"Netperf. http:\/\/www.netperf.org\/netperf\/. Netperf. http:\/\/www.netperf.org\/netperf\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.301.0034"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.24"},{"key":"e_1_3_2_1_33_1","unstructured":"RedHat CloudForms. http:\/\/www.redhat.com\/en\/technologies\/cloud-computing\/cloudforms. RedHat CloudForms. http:\/\/www.redhat.com\/en\/technologies\/cloud-computing\/cloudforms."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592009"},{"volume-title":"Rootkit detection experiment within a virtual environment. Electronics and Electrical Engineering--Kaunas: Technologija, (8): 104","year":"2009","author":"Toldinas J.","key":"e_1_3_2_1_37_1","unstructured":"uikys, and Ziberkas]toldinas2009rootkit J. Toldinas , D. Rudzika , V.vStuikys, and G. Ziberkas . Rootkit detection experiment within a virtual environment. Electronics and Electrical Engineering--Kaunas: Technologija, (8): 104 , 2009 . uikys, and Ziberkas]toldinas2009rootkitJ. Toldinas, D. Rudzika, V.vStuikys, and G. Ziberkas. Rootkit detection experiment within a virtual environment. Electronics and Electrical Engineering--Kaunas: Technologija, (8): 104, 2009."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"e_1_3_2_1_39_1","unstructured":"vmitools. https:\/\/code.google.com\/p\/vmitools\/. vmitools. https:\/\/code.google.com\/p\/vmitools\/."},{"key":"e_1_3_2_1_40_1","unstructured":"VMware Inc. Virtual Machine to ysical Machine Migration. http:\/\/www.vmware.com\/support\/v2p\/doc\/V2P_TechNote.pdf 2004. VMware Inc. Virtual Machine to ysical Machine Migration. http:\/\/www.vmware.com\/support\/v2p\/doc\/V2P_TechNote.pdf 2004."},{"key":"e_1_3_2_1_41_1","unstructured":"VMware Inc. VMware Converter User's Manual. http:\/\/www.vmware.com\/pdf\/VMware_Converter_manual.pdf 2006. VMware Inc. VMware Converter User's Manual. http:\/\/www.vmware.com\/pdf\/VMware_Converter_manual.pdf 2006."},{"key":"e_1_3_2_1_42_1","unstructured":"VMWare vRealize. https:\/\/www.vmware.com\/products\/vrealize-suite. VMWare vRealize. https:\/\/www.vmware.com\/products\/vrealize-suite."},{"key":"e_1_3_2_1_43_1","unstructured":"Volatility Framework. http:\/\/code.google.com\/p\/volatility\/. Volatility Framework. http:\/\/code.google.com\/p\/volatility\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060307"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1383422.1383437"},{"volume-title":"KVM Forum","year":"2013","author":"Wasserman O.","key":"e_1_3_2_1_46_1","unstructured":"O. Wasserman . Nested Virtualization : Shadow Turtles . In KVM Forum , Edinburgh, UK , Oct. 2013 . O. Wasserman. Nested Virtualization: Shadow Turtles. In KVM Forum, Edinburgh, UK, Oct. 2013."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168849"},{"key":"e_1_3_2_1_48_1","unstructured":"Xen Cloud Platform. http:\/\/wiki.xenproject.org\/wiki\/XCP\\_Overview. Xen Cloud Platform. http:\/\/wiki.xenproject.org\/wiki\/XCP\\_Overview."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"}],"event":{"name":"VEE '16: 12th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Atlanta Georgia USA","acronym":"VEE '16"},"container-title":["Proceedings of the12th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2892242.2892254","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2892242.2892254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T15:51:58Z","timestamp":1693842718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2892242.2892254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":49,"alternative-id":["10.1145\/2892242.2892254","10.1145\/2892242"],"URL":"https:\/\/doi.org\/10.1145\/2892242.2892254","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3007611.2892254","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}