{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:45:35Z","timestamp":1764783935725,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/trustcom.2016.0063","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:44:06Z","timestamp":1486676646000},"page":"194-200","source":"Crossref","is-referenced-by-count":5,"title":["Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments"],"prefix":"10.1109","author":[{"given":"Fangxiao","family":"Ning","sequence":"first","affiliation":[]},{"given":"Min","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ruibang","family":"You","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Efficient Main Memory Deduplication Through Cross Layer Integration Karlsruher Institut f&#x00FC;r Technologie (KIT)","year":"2014","author":"miller","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E96.A.215"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29740-3_44"},{"key":"ref13","first-page":"41","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"0"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576204"},{"key":"ref16","article-title":"Effects of memory randomization, sanitization and page cache on memory dedulication","author":"suzaki","year":"2012","journal-title":"EUROSEC&#x2019; 12"},{"key":"ref17","first-page":"1","article-title":"CovertInspector: identification of shared memory covert timing channel in multi-tenanted cloud","author":"wang","year":"2015","journal-title":"International Journal of Parallel Programming"},{"article-title":"Cain: sliently breaking ASLR in the cloud","year":"0","author":"barresi","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.01.001"},{"key":"ref4","first-page":"19","article-title":"Increasing memory density by using KSM","author":"arcangeli","year":"2009","journal-title":"Proceedings of the Linux Symposium"},{"key":"ref3","first-page":"279","article-title":"Xlh: More effective memory deduplication scanners through cross-layer hints","author":"miller","year":"2013","journal-title":"Proceedings of the 2013 USENIX Conference on Annual Technical Conference (USENIX ATC'13)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972552"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060307"},{"key":"ref7","article-title":"Software side channel attack on memory deduplication","author":"suzaki","year":"2011","journal-title":"SOSP'11 POSTER Session"},{"key":"ref2","first-page":"273","article-title":"An empirical study of memory sharing in virtual machines","author":"barker","year":"2012","journal-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC'12)"},{"key":"ref9","first-page":"159","article-title":"Whispers in the hyperspace: highspeed covert channel attacks in the cloud","author":"wu","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"key":"ref1","first-page":"225","article-title":"KVM: the Linux virtual machine monitor","volume":"1","author":"kivity","year":"2007","journal-title":"Proceedings of the Linux Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1831407.1831429"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref21","article-title":"Satori: Enlightened page sharing","author":"murray","year":"2009","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990073"},{"key":"ref25","first-page":"45","article-title":"Adding generic process containers to the Linux kernel","volume":"2","author":"menage","year":"2007","journal-title":"Proceedings of the Linux Symposium"}],"event":{"name":"2016 IEEE Trustcom\/BigDataSE\/I\u200bSPA","start":{"date-parts":[[2016,8,23]]},"location":"Tianjin, China","end":{"date-parts":[[2016,8,26]]}},"container-title":["2016 IEEE Trustcom\/BigDataSE\/ISPA"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7845250\/7846883\/07846946.pdf?arnumber=7846946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:40:27Z","timestamp":1513197627000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7846946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2016.0063","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}