메뉴 건너뛰기




Volumn , Issue , 2011, Pages 123-130

Scheduler vulnerabilities and coordinated attacks in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACT MAPPING; AMAZON EC2; ATTACK SCENARIOS; BUSINESS MODELS; CLOUD PROVIDERS; COLOCATIONS; COMPUTING SERVICES; COORDINATED ATTACK; CPU TIME; FAIR SHARE; LIMITED DATA; NETWORK TOPOLOGY; PROBABILISTIC METHODS; UPPER AND LOWER BOUNDS; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 80054989565     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2011.24     Document Type: Conference Paper
Times cited : (39)

References (32)
  • 1
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," in ACM CCS, 2009.
    • (2009) ACM Ccs
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 4
    • 80054998597 scopus 로고
    • A randomized sampling clock for cpu utilization estimation and code profiling
    • S. McCanne and C. Torek, "A randomized sampling clock for cpu utilization estimation and code profiling," in USENIX, 1993.
    • (1993) USENIX
    • McCanne, S.1    Torek, C.2
  • 8
    • 80055004265 scopus 로고    scopus 로고
    • Novell, microsoft outline virtual collaboration
    • C. Boulton, "Novell, Microsoft Outline Virtual Collaboration," Serverwatch, 2007.
    • (2007) Serverwatch
    • Boulton, C.1
  • 10
    • 84976823759 scopus 로고
    • Dhrystone benchmark: Rationale for version 2 and measurement rules
    • R. P. Weicker, "Dhrystone Benchmark: Rationale for Version 2 and Measurement Rules," SIGPLAN Notices, 1988.
    • (1988) SIGPLAN Notices
    • Weicker, R.P.1
  • 12
    • 80054972676 scopus 로고    scopus 로고
    • Task-aware virtual machine scheduling for I/O performance
    • H. Kim, H. Lim, J. Jeong, H. Jo, and J. Lee, "Task-aware virtual machine scheduling for I/O performance," in ACM VEE), 2009.
    • (2009) ACM VEE
    • Kim, H.1    Lim, H.2    Jeong, J.3    Jo, H.4    Lee, J.5
  • 14
    • 80053134453 scopus 로고    scopus 로고
    • Vulnerability seen in amazon's cloud computing
    • October
    • D. Talbot, "Vulnerability seen in amazon's cloud computing," MIT Tech Review, October 2009.
    • (2009) MIT Tech Review
    • Talbot, D.1
  • 18
    • 80054976489 scopus 로고    scopus 로고
    • Xen and co.: Communication-aware cpu scheduling for consolidated xen-based hosting platforms
    • S. Govindan, A. Nath, A. Das, B. Urgaonkar, and A. Sivasubramaniam, "Xen and co.: communication-aware cpu scheduling for consolidated xen-based hosting platforms," in ACM VEE, 2007.
    • (2007) ACM VEE
    • Govindan, S.1    Nath, A.2    Das, A.3    Urgaonkar, B.4    Sivasubramaniam, A.5
  • 19
    • 80055014430 scopus 로고    scopus 로고
    • Scheduling I/O in a virtual machine monitor
    • D. Ongaro, A. L. Cox, and S. Rixner, "Scheduling I/O in a virtual machine monitor," in ACM VEE, 2008.
    • (2008) ACM VEE
    • Ongaro, D.1    Cox, A.L.2    Rixner, S.3
  • 20
    • 74349131504 scopus 로고    scopus 로고
    • The hybrid scheduling framework for virtual machine systems
    • C. Weng, Z. Wang, M. Li, and X. Lu, "The hybrid scheduling framework for virtual machine systems," in ACM VEE, 2009.
    • (2009) ACM VEE
    • Weng, C.1    Wang, Z.2    Li, M.3    Lu, X.4
  • 21
    • 70649101118 scopus 로고    scopus 로고
    • Measuring CPU overhead for I/O processing in the xen virtual machine monitor
    • L. Cherkasova and R. Gardner, "Measuring CPU overhead for I/O processing in the Xen virtual machine monitor," in USENIX, 2005.
    • (2005) USENIX
    • Cherkasova, L.1    Gardner, R.2
  • 22
    • 57349155964 scopus 로고    scopus 로고
    • High performance VMM-bypass I/O in virtual machines
    • J. Liu, W. Huang, B. Abali, and D. K. Panda, "High performance VMM-bypass I/O in virtual machines," in USENIX, 2006.
    • (2006) USENIX
    • Liu, J.1    Huang, W.2    Abali, B.3    Panda, D.K.4
  • 25
    • 34548078618 scopus 로고    scopus 로고
    • High performance and scalable I/O virtualization via self-virtualized devices
    • H. Raj and K. Schwan, "High performance and scalable I/O virtualization via self-virtualized devices," in 16th Int'l Symp. HPDC, 2007.
    • (2007) 16th Int'l Symp. HPDC
    • Raj, H.1    Schwan, K.2
  • 27
    • 80052376621 scopus 로고    scopus 로고
    • Improving xen security through disaggregation
    • D. G. Murray, G. Milos, and S. Hand, "Improving Xen security through disaggregation," in ACM VEE, 2008.
    • (2008) ACM VEE
    • Murray, D.G.1    Milos, G.2    Hand, S.3
  • 28
    • 80054979403 scopus 로고    scopus 로고
    • Policy enforcement and compliance proofs for xen virtual machines
    • B. Jansen, H. V. Ramasamy, and M. Schunter, "Policy enforcement and compliance proofs for Xen virtual machines," in ACM VEE, 2008.
    • (2008) ACM VEE
    • Jansen, B.1    Ramasamy, H.V.2    Schunter, M.3
  • 29
    • 0022037993 scopus 로고
    • An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels
    • J. Komlós and A. G. Greenberg, "An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels," IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 302-306, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.2 , pp. 302-306
    • Komlós, J.1    Greenberg, A.G.2
  • 30
    • 0022092597 scopus 로고
    • Lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels
    • DOI 10.1145/3828.214125
    • A. G. Greenberg and S. Winograd, "A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels," J. ACM, vol. 32, no. 3, pp. 589-596, 1985. (Pubitemid 15507403)
    • (1985) Journal of the ACM , vol.32 , Issue.3 , pp. 589-596
    • Greenberg Albert, G.1    Winograd Shmuel2
  • 31
    • 0023331338 scopus 로고
    • Estimating the multiplicities of conflicts to speed their resolution in multiple access channels
    • DOI 10.1145/23005.23006
    • A. G. Greenberg, P. Flajolet, and R. E. Ladner, "Estimating the multiplicities of conflicts to speed their resolution in multiple access channels," J. ACM, vol. 34, no. 2, pp. 289-325, 1987. (Pubitemid 17602849)
    • (1987) Journal of the ACM , vol.34 , Issue.2 , pp. 289-325
    • Greenberg Albert, G.1    Flajolet Philippe2    Ladner Richard, E.3
  • 32
    • 84890022849 scopus 로고    scopus 로고
    • Cybercrime's "access" and "authorization," in computer misuse statutes
    • O. Kerr, "Cybercrime's "access" and " authorization" in computer misuse statutes," NYU Law Review, 2003.
    • (2003) NYU Law Review
    • Kerr, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.