Gavrilova, M. and Tan, C., editors, Trans. on Com-
putational Science VII, volume 5890 of LNCS, pages
101–121. Springer.
Correia, M. (2012). Software execution protection in the
cloud. In Proceedings of the 1st European Workshop
on Dependable Cloud Computing, EWDCC ’12, New
York, NY, USA. ACM.
Cucinotta, T., Cherubini, D., and Jul, E. (2014). Confiden-
tial Domains of Execution. to appear in Bell Labs
Technical Journal, 19(1).
Duflot, L., Etiemble, D., and Grumelard, O. (2006). Using
CPU System Management Mode to Circumvent Op-
erating System Security Functions. In CanSecWest.
Fukushima, M., Hasegawa, T., Hasegawa, T., and Nakao,
A. (2011). Minimum Disclosure Routing for network
virtualization. In Proc. of 14
th
Global Internet Sym-
posium (GI) 2011 at IEEE INFOCOM 2011.
Hao, J. and Cai, W. (2011). Trusted Block as a Service: To-
wards Sensitive Applications on the Cloud. In Trust,
Security and Privacy in Computing and Communica-
tions (TrustCom), Proc. of 10
th
Int. Conf. on, pages
73–82.
Keller, E., Szefer, J., Rexford, J., and Lee, R. B. (2010).
Nohype: virtualized cloud infrastructure without the
virtualization. SIGARCH Comput. Archit. News,
38(3):350–361.
Lie, D., Thekkath, C. A., Mitchell, M., Lincoln, P., Boneh,
D., Mitchell, J. C., and Horowitz, M. (2000). Archi-
tectural Support for Copy and Tamper Resistant Soft-
ware. In ASPLOS, pages 168–177. ACM Press.
Liedtke, J. (1995). On micro-kernel construction. SIGOPS
Oper. Syst. Rev., 29(5):237–250.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). OpenFlow: enabling innovation in cam-
pus networks. SIGCOMM Comput. Commun. Rev.,
38(2):69–74.
NFV Industry Specif. Group (2012). Network Functions
Virtualisation. Introductory White Paper.
O. M. E. Committee (2012). Software-defined Network-
ing: The New Norm for Networks. Open Networking
Foundation.
Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Bal-
akrishnan, H. (2011). CryptDB: protecting confiden-
tiality with encrypted query processing. In Proc. of
the 23
rd
ACM Symp. on Operating Systems Principles,
SOSP ’11, pages 85–100.
Rashid, R. F. (1986). From RIG to Accent to Mach: the
evolution of a network operating system. In Proc. of
1986 ACM Fall joint computer conference, ACM ’86,
pages 1128–1137.
Sachs, J. and Baucke, S. (2008). Virtual radio: a framework
for configurable radio networks. In Proceedings of
the 4
th
Annual International Conference on Wireless
Internet, WICON ’08, pages 61:1–61:7.
Singaravelu, L., Pu, C., H
¨
artig, H., and Helmuth, C. (2006).
Reducing TCB complexity for security-sensitive ap-
plications: three case studies. SIGOPS Oper. Syst.
Rev., 40(4):161–174.
Steinberg, U. and Kauer, B. (2010). NOVA: a
microhypervisor-based secure virtualization architec-
ture. In Proc. of the 5
th
European Conf. on Computer
systems, EuroSys ’10. ACM.
Suh, G. E., Clarke, D., Gassend, B., Dijk, M. v., and De-
vadas, S. (2003a). Efficient Memory Integrity Verifi-
cation and Encryption for Secure Processors. In Proc.
of the 36
th
annual IEEE/ACM Int. Symp. on Microar-
chitecture, MICRO 36, Washington, DC, USA. IEEE
Computer Society.
Suh, G. E., Clarke, D., Gassend, B., van Dijk, M., and De-
vadas, S. (2003b). AEGIS: architecture for tamper-
evident and tamper-resistant processing. In ICS ’03:
Proc. of the 17
th
annual Int. Conf. on Supercomputing,
New York, NY, USA. ACM.
Szefer, J., Keller, E., Lee, R. B., and Rexford, J. (2011a).
Eliminating the Hypervisor Attack Surface for a More
Secure Cloud. In Proc. of CCS 2011, Chicago, Illi-
nois, USA.
Szefer, J., Zhang, W., Chen, Y.-Y., Champagne, D., Chan,
K., Li, W. X. Y., Cheung, R. C. C., and Lee, R. B.
(2011b). Rapid single-chip secure processor prototyp-
ing on the OpenSPARC FPGA platform. In Int. Symp.
on Rapid System Prototyping, pages 38–44.
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A. L., Martins,
F. C. M., Anderson, A. V., Bennett, S. M., Kagi, A.,
Leung, F. H., and Smith, L. (2005). Intel Virtualiza-
tion Technology. Computer, 38(5):48–56.
Yang, J., Zhang, Y., and Gao, L. (2003). Fast Secure Proces-
sor for Inhibiting Software Piracy and Tampering. In
Proc. of the 36
th
annual IEEE/ACM Int. Symp.on Mi-
croarchitecture, MICRO 36, pages 351–, Washington,
DC, USA. IEEE Computer Society.
ConfidentialExecutionofCloudServices
621