메뉴 건너뛰기




Volumn , Issue , 2011, Pages 313-328

HomeAlone: Co-residency detection in the cloud via side-channel analysis

Author keywords

Cloud computing; Co residency detection; Infrastructure as a service (IaaS); Side channel analysis

Indexed keywords

CACHE MEMORY; INFRASTRUCTURE AS A SERVICE (IAAS); SENSITIVE DATA;

EID: 80052008862     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.31     Document Type: Conference Paper
Times cited : (292)

References (49)
  • 1
    • 85177666484 scopus 로고    scopus 로고
    • Amazon elastic compute cloud. http://aws.amazon.com/ec2/.
  • 3
    • 85177677746 scopus 로고    scopus 로고
    • Rackspace. http://www.rackspacecloud.com/.
  • 19
    • 0031313967 scopus 로고    scopus 로고
    • Statistical applications to the poisson-binomial and conditional bernoulli distributions
    • S.X̃. Chen and J.S̃. Liu. Statistical applications to the Poisson-binomial and conditional Bernoulli distributions. Statistica Sinica, 7:875-892, 1997.
    • (1997) Statistica Sinica , vol.7 , pp. 875-892
    • Chen, S.X.1    Liu, J.S.2
  • 27
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Advances in Cryptology - CRYPTO '96
    • P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology - Proceedings of Crypto'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996. (Pubitemid 126106234)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 32
    • 33846483949 scopus 로고    scopus 로고
    • Intel virtualization technology: Hardware support for for efficient processor virtualization
    • G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel virtualization technology: Hardware support for for efficient processor virtualization. Intel Technology Journal, 10, 2006.
    • Intel Technology Journal , vol.10 , pp. 2006
    • Neiger, G.1    Santoni, A.2    Leung, F.3    Rodgers, D.4    Uhlig, R.5
  • 35
    • 34047117968 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • C. Percival. Cache missing for fun and profit. In BSDCon 2005, 2005.
    • (2005) BSDCon 2005
    • Percival, C.1
  • 39
    • 80051997870 scopus 로고    scopus 로고
    • Companies slowly join cloud-computing
    • 18 April
    • B. Stone and A. Vance. Companies slowly join cloud-computing. New York Times, 18 April 2010.
    • (2010) New York Times
    • Stone, B.1    Vance, A.2
  • 41
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasures
    • E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
    • (2010) Journal of Cryptology , vol.23 , Issue.1 , pp. 37-71
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 45
    • 85177666805 scopus 로고    scopus 로고
    • Will security concerns darken google's government cloud?
    • 17 September
    • J. Vijayan. Will security concerns darken Google's government cloud? ComputerWorld, 17 September 2009.
    • (2009) ComputerWorld
    • Vijayan, J.1
  • 46
    • 34547331261 scopus 로고    scopus 로고
    • Covert and side channels due to processor architecture
    • DOI 10.1109/ACSAC.2006.20, 4041191, Proceedings - Annual Computer Security Applications Conference, ACSAC
    • Z. Wang and R. B. Lee. Covert and side channels due to processor architecture. In 22nd Annual Computer Security Applications Conference (ACSAC), pages 473-482, December 2006. (Pubitemid 351232939)
    • (2006) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 473-482
    • Wang, Z.1    Lee, R.B.2
  • 47
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • DOI 10.1145/1250662.1250723, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings
    • Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In 34th International Symposium on Computer Architecture, pages 494-505, June 2007. (Pubitemid 47582127)
    • (2007) Proceedings - International Symposium on Computer Architecture , pp. 494-505
    • Wang, Z.1    Lee, R.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.