Network and Distributed System Security Symposium, NDSS 2017


Article Details
Title: Deconstructing Xen
Article URLs:
Alternative Article URLs:
Authors: Le Shi
  • Shanghai Jiao Tong Univeristy, Shanghai Key Laboratory of Scalable Computing and Systems
  • Shanghai Jiao Tong Univeristy, Institute of Parallel and Distributed Systems
Yuming Wu
  • Shanghai Jiao Tong Univeristy, Shanghai Key Laboratory of Scalable Computing and Systems
  • Shanghai Jiao Tong Univeristy, Institute of Parallel and Distributed Systems
Yubin Xia
  • Shanghai Jiao Tong Univeristy, Shanghai Key Laboratory of Scalable Computing and Systems
  • Shanghai Jiao Tong Univeristy, Institute of Parallel and Distributed Systems
Nathan Dautenhahn
  • Shanghai Jiao Tong Univeristy, Shanghai Key Laboratory of Scalable Computing and Systems
  • University of Pennsylvania, Department of Computer and Information Sciences
Haibo Chen
  • Shanghai Jiao Tong Univeristy, Shanghai Key Laboratory of Scalable Computing and Systems
  • Shanghai Jiao Tong Univeristy, Institute of Parallel and Distributed Systems
Binyu Zang
  • Shanghai Jiao Tong Univeristy, Institute of Parallel and Distributed Systems
Jinming Li
  • Huawei Technologies, Inc.
Sharing: Unknown
Verification: Authors have not verified information
Artifact Evaluation Badge: none
Artifact URLs:
Artifact Correspondence Email Addresses:
NSF Award Numbers: 1513687
DBLP Key: conf/ndss/ShiWXDCZL17
Author Comments:

Discuss this paper and its artifacts below