-
1
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in SOSP, 2003, pp. 164-177. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
54049106582
-
Virtual machine introspection: Observation or interference?
-
K. Nance, M. Bishop, and B. Hay, "Virtual machine introspection: Observation or interference?" IEEE Security and Privacy, vol. 6, no. 5, pp. 32-37, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.5
, pp. 32-37
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
4
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE Computer Society
-
Z. Wang and X. Jiang, "Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2010, pp. 380-395.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
5
-
-
38349041413
-
A layered approach to simplified access control in virtualized systems
-
B. D. Payne, R. Sailer, R. Cáceres, R. Perez, and W. Lee, "A layered approach to simplified access control in virtualized systems," Operating Systems Review, vol. 41, no. 4, pp. 12-19, 2007.
-
(2007)
Operating Systems Review
, vol.41
, Issue.4
, pp. 12-19
-
-
Payne, B.D.1
Sailer, R.2
Cáceres, R.3
Perez, R.4
Lee, W.5
-
6
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
DOI 10.1109/CSAC.2005.13, 1565255, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn, "Building a mac-based security architecture for the xen open-source hypervisor," in ACSAC. IEEE Computer Society, 2005, pp. 276-285. (Pubitemid 46116484)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
7
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines," in SAC, 2010, pp. 173-180.
-
(2010)
SAC
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
9
-
-
79751511212
-
Whats new about cloud computing security?
-
EECS Department Jan
-
Y. Chen, V. Paxson, and R. H. Katz, "Whats new about cloud computing security?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5, Jan 2010, http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/ EECS-2010-5.html.
-
(2010)
University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
10
-
-
78650158728
-
Determinating timing channels in compute clouds
-
New York, NY, USA: ACM
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds," in CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. New York, NY, USA: ACM, 2010, pp. 103-108.
-
(2010)
CCSW '10: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
11
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
Berkeley, CA, USA: USENIX Association
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on ssh," in SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2001, pp. 25-25.
-
(2001)
SSYM'01: Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
13
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
14
-
-
0032641890
-
20 years of covert channel modeling and analysis
-
J. K. Millen, "20 years of covert channel modeling and analysis," in IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 113-114
-
-
Millen, J.K.1
-
15
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
-
(2007)
IEEE Communications Surveys and Tutorials
, vol.9
, Issue.1-4
, pp. 44-57
-
-
Zander, S.1
Armitage, G.J.2
Branch, P.3
-
16
-
-
80052935703
-
Improving performance of network covert timing channel through huffman coding
-
Gwangju, Korea, December
-
J. Wu, Y. Wang, L. Ding, and X. Liao, "Improving performance of network covert timing channel through huffman coding," in The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010), Gwangju, Korea, December 2010.
-
(2010)
The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010)
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Liao, X.4
-
18
-
-
77957969195
-
Covert channel research
-
Y. Wang, J. Wu, L. Ding, and X. Liao, "Covert channel research," Journal of Software, vol. 21, no. 9, pp. 2262-2288, 2010.
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2262-2288
-
-
Wang, Y.1
Wu, J.2
Ding, L.3
Liao, X.4
-
19
-
-
80052683831
-
Constructing scenario of event-flag covert channel in secure operating system
-
Hongkong, December
-
J. Wu, Y. Wang, L. Ding, and Y. Zhang, "Constructing scenario of event-flag covert channel in secure operating system," in 2nd International Conference on Information and Multimedia Technology (ICIMT 2010), Hongkong, December 2010, pp. 371 - 375.
-
(2010)
2nd International Conference on Information and Multimedia Technology (ICIMT 2010)
, pp. 371-375
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Zhang, Y.4
-
20
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
R. A. Kemmerer, "Shared resource matrix methodology: An approach to identifying storage and timing channels," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 256-277, 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
21
-
-
76849086598
-
IP covert channel detection
-
S. Cabuk, C. E. Brodley, and C. Shields, "IP covert channel detection," ACM Trans. Inf. Syst. Secur., vol. 12, no. 4, pp. 1-29, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.4
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
22
-
-
38049087058
-
-
Rapport technique TR536, del Université de Dartmouth. Novembre
-
V. Berk, A. Giani, G. Cybenko, and N. Hanover, "Detection of covert channel encoding in network packet delays," Rapport technique TR536, del Université de Dartmouth. Novembre, 2005.
-
(2005)
Detection of Covert Channel Encoding in Network Packet Delays
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
Hanover, N.4
-
23
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. I. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization," in IEEE Symposium on Security and Privacy, 2008, pp. 233-247.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.I.3
Lee, W.4
-
24
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, "Hypersentry: enabling stealthy in-context measurement of hypervisor integrity," in ACM Conference on Computer and Communications Security, 2010, pp. 38-49.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
25
-
-
77957749524
-
Time and probability-based information flow analysis
-
IEEE Transactions on
-
R. Lanotte, A. Maggiolo-Schettini, and A. Troina, "Time and probability-based information flow analysis," Software Engineering, IEEE Transactions on, vol. 36, no. 5, pp. 719-734, 2010.
-
(2010)
Software Engineering
, vol.36
, Issue.5
, pp. 719-734
-
-
Lanotte, R.1
Maggiolo-Schettini, A.2
Troina, A.3
-
26
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
DOI 10.1109/TIT.2002.801405, PII 1011092002801405
-
J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Transactions on Information Theory, vol. 48, no. 9, pp. 2455-2477, 2002. (Pubitemid 35032673)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
27
-
-
33750931965
-
Run-time detection of covert channels
-
DOI 10.1109/ARES.2006.114, 1625360, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
N. Nagatou and T. Watanabe, "Run-time detection of covert channels," in ARES, 2006, pp. 577-584. (Pubitemid 44732694)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 577-584
-
-
Nagatou, N.1
Watanabe, T.2
-
28
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
30
-
-
0025438147
-
On the identification of covert storage channels in secure systems
-
DOI 10.1109/32.55086
-
C.-R. Tsai, V. D. Gligor, and C. S. Chandersekaran, "On the identification of covert storage channels in secure systems," IEEE Trans. Software Eng., vol. 16, no. 6, pp. 569-580, 1990. (Pubitemid 20737559)
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 569-580
-
-
Tsai Chii-Ren1
Gligor Virgil, D.2
Chandersekaran, C.S.3
-
31
-
-
0026260664
-
Covert flow trees: A visual approach to analyzing covert storage channels
-
R. A. Kemmerer and P. A. Porras, "Covert flow trees: A visual approach to analyzing covert storage channels," IEEE Trans. Software Eng., vol. 17, no. 11, pp. 1166-1185, 1991.
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
33
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
C. Lattner and V. S. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation," in CGO, 2004, pp. 75-88.
-
(2004)
CGO
, pp. 75-88
-
-
Lattner, C.1
Adve, V.S.2
-
34
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis," Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
-
(2009)
Comput. Secur.
, vol.28
, Issue.6
, pp. 421-432
-
-
Son, J.1
Alves-Foss, J.2
-
35
-
-
51649119359
-
Covert channel mitigation method. for secure real-time database using capacity metric
-
H. Zeng, Y. Wang, L. Ruan, W. Zu, and J. Cai, "Covert channel mitigation method. for secure real-time database using capacity metric," Journal on Communications, vol. 29, no. 8, pp. 46-56, 2008.
-
(2008)
Journal on Communications
, vol.29
, Issue.8
, pp. 46-56
-
-
Zeng, H.1
Wang, Y.2
Ruan, L.3
Zu, W.4
Cai, J.5
-
36
-
-
0036494997
-
Maintaining security and timeliness in real-time database system
-
PII S016412120100111X
-
Q. N. Ahmed and S. V. Vrbsky, "Maintaining security and timeliness in real-time database system," Journal of Systems and Software, vol. 61, no. 1, pp. 15 - 29, 2002. (Pubitemid 34223165)
-
(2002)
Journal of Systems and Software
, vol.61
, Issue.1
, pp. 15-29
-
-
Ahmed, Q.N.1
Vrbsky, S.V.2
-
37
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
H. Zeng, Y. Wang, W. Zu, J. Cai, and L. Ruan, "New definition of small message criterion and its application in transaction covert channel mitigating," Journal of Software, vol. 20, no. 4, pp. 985-996, 2009.
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.1
Wang, Y.2
Zu, W.3
Cai, J.4
Ruan, L.5
-
38
-
-
0028566761
-
Covert channels-here to stay?
-
COMPASS '94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security. Proceedings of the Ninth Annual Conference on, Jun-1 Jul
-
I. Moskowitz and M. Kang, "Covert channels-here to stay?" in Computer Assurance, 1994. COMPASS '94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security. Proceedings of the Ninth Annual Conference on, Jun-1 Jul 1994, pp. 235-243.
-
(1994)
Computer Assurance, 1994
, pp. 235-243
-
-
Moskowitz, I.1
Kang, M.2
-
39
-
-
14844330726
-
IP covert timing channels: Design and detection
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
S. Cabuk, C. E. Brodley, and C. Shields, "Ip covert timing channels: design and detection," in ACM Conference on Computer and Communications Security, 2004, pp. 178-187. (Pubitemid 40338199)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
40
-
-
0032075067
-
Learning string-edit distance
-
E. S. Ristad and P. N. Yianilos, "Learning string-edit distance," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 5, pp. 522-532, 1998. (Pubitemid 128741331)
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.5
, pp. 522-532
-
-
Ristad, E.S.1
Yianilos, P.N.2
-
41
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
L. Yao, X. Zi, L. Pan, and J. Li, "A study of on/off timing channel based on packet delay distribution," Computers & Security, vol. 28, no. 8, pp. 785 - 794, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
42
-
-
70349682314
-
TCP/IP timing channels: Theory to implementation
-
S. H. Sellke, C.-C. Wang, S. Bagchi, and N. B. Shroff, "TCP/IP timing channels: Theory to implementation," in INFOCOM, 2009, pp. 2204-2212.
-
(2009)
INFOCOM
, pp. 2204-2212
-
-
Sellke, S.H.1
Wang, C.-C.2
Bagchi, S.3
Shroff, N.B.4
|