메뉴 건너뛰기




Volumn , Issue , 2011, Pages 283-291

Identification and evaluation of sharing memory covert timing channel in Xen virtual machines

Author keywords

Channel identification; Channel performance evaluation; Channel scenario construction; Cloud computing; Covert timing channel; Xen

Indexed keywords

CHANNEL IDENTIFICATION; COVERT CHANNELS; COVERT TIMING CHANNELS; EQUIVALENT CODES; IDENTIFICATION AND EVALUATION; IDENTIFICATION METHOD; INFORMATION FLOWS; OPERATIONAL PROCESS; PERFORMANCE EVALUATION; SEARCH ALGORITHMS; SHARED RESOURCES; SHARING MEMORIES; SOURCE CODES; TRANSMISSION CHANNELS; VIRTUAL MACHINES; VIRTUALIZATIONS; XEN;

EID: 80052666134     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2011.10     Document Type: Conference Paper
Times cited : (49)

References (42)
  • 2
    • 54049106582 scopus 로고    scopus 로고
    • Virtual machine introspection: Observation or interference?
    • K. Nance, M. Bishop, and B. Hay, "Virtual machine introspection: Observation or interference?" IEEE Security and Privacy, vol. 6, no. 5, pp. 32-37, 2008.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.5 , pp. 32-37
    • Nance, K.1    Bishop, M.2    Hay, B.3
  • 4
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • IEEE Computer Society
    • Z. Wang and X. Jiang, "Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2010, pp. 380-395.
    • (2010) IEEE Symposium on Security and Privacy , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 5
    • 38349041413 scopus 로고    scopus 로고
    • A layered approach to simplified access control in virtualized systems
    • B. D. Payne, R. Sailer, R. Cáceres, R. Perez, and W. Lee, "A layered approach to simplified access control in virtualized systems," Operating Systems Review, vol. 41, no. 4, pp. 12-19, 2007.
    • (2007) Operating Systems Review , vol.41 , Issue.4 , pp. 12-19
    • Payne, B.D.1    Sailer, R.2    Cáceres, R.3    Perez, R.4    Lee, W.5
  • 8
    • 77954737019 scopus 로고    scopus 로고
    • Load-based covert channels between xen virtual machines
    • K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines," in SAC, 2010, pp. 173-180.
    • (2010) SAC , pp. 173-180
    • Okamura, K.1    Oyama, Y.2
  • 13
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 14
    • 0032641890 scopus 로고    scopus 로고
    • 20 years of covert channel modeling and analysis
    • J. K. Millen, "20 years of covert channel modeling and analysis," in IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
    • (1999) IEEE Symposium on Security and Privacy , pp. 113-114
    • Millen, J.K.1
  • 15
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
    • (2007) IEEE Communications Surveys and Tutorials , vol.9 , Issue.1-4 , pp. 44-57
    • Zander, S.1    Armitage, G.J.2    Branch, P.3
  • 18
    • 77957969195 scopus 로고    scopus 로고
    • Covert channel research
    • Y. Wang, J. Wu, L. Ding, and X. Liao, "Covert channel research," Journal of Software, vol. 21, no. 9, pp. 2262-2288, 2010.
    • (2010) Journal of Software , vol.21 , Issue.9 , pp. 2262-2288
    • Wang, Y.1    Wu, J.2    Ding, L.3    Liao, X.4
  • 20
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • R. A. Kemmerer, "Shared resource matrix methodology: An approach to identifying storage and timing channels," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256-277, 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 25
    • 77957749524 scopus 로고    scopus 로고
    • Time and probability-based information flow analysis
    • IEEE Transactions on
    • R. Lanotte, A. Maggiolo-Schettini, and A. Troina, "Time and probability-based information flow analysis," Software Engineering, IEEE Transactions on, vol. 36, no. 5, pp. 719-734, 2010.
    • (2010) Software Engineering , vol.36 , Issue.5 , pp. 719-734
    • Lanotte, R.1    Maggiolo-Schettini, A.2    Troina, A.3
  • 26
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • DOI 10.1109/TIT.2002.801405, PII 1011092002801405
    • J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, 2002. (Pubitemid 35032673)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 28
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 31
    • 0026260664 scopus 로고
    • Covert flow trees: A visual approach to analyzing covert storage channels
    • R. A. Kemmerer and P. A. Porras, "Covert flow trees: A visual approach to analyzing covert storage channels," IEEE Trans. Software Eng., vol. 17, no. 11, pp. 1166-1185, 1991.
    • (1991) IEEE Trans. Software Eng. , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 33
    • 3042658703 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • C. Lattner and V. S. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation," in CGO, 2004, pp. 75-88.
    • (2004) CGO , pp. 75-88
    • Lattner, C.1    Adve, V.S.2
  • 34
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis," Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
    • (2009) Comput. Secur. , vol.28 , Issue.6 , pp. 421-432
    • Son, J.1    Alves-Foss, J.2
  • 35
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method. for secure real-time database using capacity metric
    • H. Zeng, Y. Wang, L. Ruan, W. Zu, and J. Cai, "Covert channel mitigation method. for secure real-time database using capacity metric," Journal on Communications, vol. 29, no. 8, pp. 46-56, 2008.
    • (2008) Journal on Communications , vol.29 , Issue.8 , pp. 46-56
    • Zeng, H.1    Wang, Y.2    Ruan, L.3    Zu, W.4    Cai, J.5
  • 36
    • 0036494997 scopus 로고    scopus 로고
    • Maintaining security and timeliness in real-time database system
    • PII S016412120100111X
    • Q. N. Ahmed and S. V. Vrbsky, "Maintaining security and timeliness in real-time database system," Journal of Systems and Software, vol. 61, no. 1, pp. 15 - 29, 2002. (Pubitemid 34223165)
    • (2002) Journal of Systems and Software , vol.61 , Issue.1 , pp. 15-29
    • Ahmed, Q.N.1    Vrbsky, S.V.2
  • 37
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • H. Zeng, Y. Wang, W. Zu, J. Cai, and L. Ruan, "New definition of small message criterion and its application in transaction covert channel mitigating," Journal of Software, vol. 20, no. 4, pp. 985-996, 2009.
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.1    Wang, Y.2    Zu, W.3    Cai, J.4    Ruan, L.5
  • 38
    • 0028566761 scopus 로고
    • Covert channels-here to stay?
    • COMPASS '94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security. Proceedings of the Ninth Annual Conference on, Jun-1 Jul
    • I. Moskowitz and M. Kang, "Covert channels-here to stay?" in Computer Assurance, 1994. COMPASS '94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security. Proceedings of the Ninth Annual Conference on, Jun-1 Jul 1994, pp. 235-243.
    • (1994) Computer Assurance, 1994 , pp. 235-243
    • Moskowitz, I.1    Kang, M.2
  • 41
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • L. Yao, X. Zi, L. Pan, and J. Li, "A study of on/off timing channel based on packet delay distribution," Computers & Security, vol. 28, no. 8, pp. 785 - 794, 2009.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 42
    • 70349682314 scopus 로고    scopus 로고
    • TCP/IP timing channels: Theory to implementation
    • S. H. Sellke, C.-C. Wang, S. Bagchi, and N. B. Shroff, "TCP/IP timing channels: Theory to implementation," in INFOCOM, 2009, pp. 2204-2212.
    • (2009) INFOCOM , pp. 2204-2212
    • Sellke, S.H.1    Wang, C.-C.2    Bagchi, S.3    Shroff, N.B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.