-
3
-
-
2642534513
-
Practical data hiding in tcp/ip
-
Dallas, TX, USA, September
-
AHSAN, K., AND KUNDUR, D. Practical data hiding in tcp/ip. In Proceedings of the 9th workshop on Multimedia & Security, (MM&Sec'02) (Dallas, TX, USA, September 2002).
-
(2002)
Proceedings of the 9th Workshop on Multimedia & Security, (MM&Sec'02)
-
-
Ahsan, K.1
Kundur, D.2
-
5
-
-
77950347409
-
A view of cloud computing
-
April
-
ARMBRUST, M., Fox, A., GRIFFITH, R., JOSEPH, A. D., KATZ, R., KONWINSKI, A., LEE, G., PATTERSON, D., RABKIN, A., STOICA, I., AND ZAHARIA, M. A view of cloud computing. Commun. ACM 53 (April 2010), 50-58.
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
6
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
Chicago, IL, USA, October
-
ASKAROV, A., ZHANG, D., AND MYERS, A. Predictive black-box mitigation of timing channels. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10) (Chicago, IL, USA, October 2010).
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
-
-
Askarov, A.1
Zhang, D.2
Myers, A.3
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY, October
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., Ho, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03) (Bolton Landing, NY, October 2003).
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
9
-
-
14844330726
-
Ip covert timing channels: Design and detection
-
Washington, DC, USA, October
-
CABUK, S., BRODLEY, C. E., AND SHIELDS, C. Ip covert timing channels: Design and detection. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04) (Washington, DC, USA, October 2004).
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
10
-
-
0038486621
-
Performance and scalability of ejb applications
-
Seattle, WA, USA, November
-
CECCHET, E., MARGUERITE, J., AND ZWAENEPOEL, W. Performance and scalability of ejb applications. In Proceedings of the 17th ACM SIC PLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA '02) (Seattle, WA, USA, November 2002).
-
(2002)
Proceedings of the 17th ACM SIC PLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA '02)
-
-
Cecchet, E.1
Marguerite, J.2
Zwaenepoel, W.3
-
11
-
-
77954327465
-
What's new about cloud computing security?
-
University of California, Berkeley, Jan
-
CHEN, Y., PAXSON, V., AND KATZ, R. H. What's new about cloud computing security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley, Jan 2010.
-
(2010)
Tech. Rep. UCB/EECS-2010-5, EECS Department
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
12
-
-
80955164549
-
-
Governemnt Cloud Computing Platforms
-
CLOUDBOOK: THE CLOUD COMPUTING & SAAS INFORMATION RESOURCE. Governemnt Cloud Computing Platforms. http://www.cloudbook.net/directories/gov- clouds/government-cloud-computing.php, 2011.
-
(2011)
-
-
-
13
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern ×86 processors
-
Oakland, CA, USA, May
-
COPPENS, B., VERBAUWHEDE, I., SUTTER, B. D., AND BOSSCHERE, K. D. Practical mitigations for timing-based side-channel attacks on modern ×86 processors. In Proceedings of the 30th IEEE Symposium on Security & Privacy (S&P'09) (Oakland, CA, USA, May 2009).
-
(2009)
Proceedings of the 30th IEEE Symposium on Security & Privacy (S&P'09)
-
-
Coppens, B.1
Verbauwhede, I.2
Sutter, B.D.3
Bosschere, K.D.4
-
14
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
COPPERSMITH, D. Small solutions to polynomial equations, and low exponent rsa vulnerabilities. Journal of Cryptology 10 (1997), 233-260. 10.1007/s001459900030. (Pubitemid 127754574)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
15
-
-
79955948413
-
Designs, lessons and advice from building large distributed systems
-
Big Sky, MT, USA, October Keynote speech
-
DEAN, J. Designs, lessons and advice from building large distributed systems. In Proceedings of the 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS'09) (Big Sky, MT, USA, October 2009). Keynote speech.
-
(2009)
Proceedings of the 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS'09)
-
-
Dean, J.1
-
19
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
Alexandria, VA, USA, October
-
GIANVECCHIO, S., AND WANG, H. Detecting covert timing channels: An entropy-based approach. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07) (Alexandria, VA, USA, October 2007).
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
-
-
Gianvecchio, S.1
Wang, H.2
-
20
-
-
32444445843
-
Covert messaging through tcp timestamps
-
San Francisco, CA, USA, April
-
GIFFIN, J., GREENSTADT, R., LITWACK, P., AND TIBBETTS, R. Covert messaging through tcp timestamps. In Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02) (San Francisco, CA, USA, April 2002).
-
(2002)
Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02)
-
-
Giffin, J.1
Greenstadt, R.2
Litwack, P.3
Tibbetts, R.4
-
23
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
JAEGER, T., AND SCHIFFMAN, J. Outlook: Cloudy with a chance of security challenges and improvements. IEEE Security and Privacy 8 (2010), 77-80.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
24
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
Saint-Malo, France, June
-
KELLER, E., SZEFER, J., REXFORD, J., AND LEE, R. B. Nohype: Virtualized cloud infrastructure without the virtualization. In Proceedings of the 37th International Symposium on Computer Architecture (ISCA'10) (Saint-Malo, France, June 2010).
-
(2010)
Proceedings of the 37th International Symposium on Computer Architecture (ISCA'10)
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
25
-
-
0001297528
-
Timing attacks on implementations of difhe-hellman, rsa, dss, and other systems
-
London, UK
-
KOCHER, P. C. Timing attacks on implementations of difhe-hellman, rsa, dss, and other systems. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'96) (London, UK, 1996).
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'96)
-
-
Kocher, P.C.1
-
26
-
-
0015672289
-
A note on the confinement problem
-
October
-
LAMPSON, B. W. A note on the confinement problem. Commun. ACM 16 (October 1973), 613-615.
-
(1973)
Commun. ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.W.1
-
28
-
-
80955148035
-
-
OW2. Rubis, http://rubis.ow2.org/.
-
-
-
-
29
-
-
70350699446
-
Cache missing for fun and profit
-
Ottawa, Canada, May
-
PERCIVAL, C. Cache missing for fun and profit. In Proceedings of BSDCan 2005 (Ottawa, Canada, May 2005).
-
(2005)
Proceedings of BSDCan 2005
-
-
Percival, C.1
-
30
-
-
80955144871
-
-
RACKSPACE
-
RACKSPACE. Rackspace cloud hosting, http://www.rackspacecloud.com/.
-
-
-
-
31
-
-
74049152260
-
Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds
-
Chicago, IL, USA, November
-
RlSTENPART, T., TROMER, E., SHACHAM, FL, AND SAVAGE, S. Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09) (Chicago, IL, USA, November 2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
-
-
Rlstenpart, T.1
Tromer, E.2
Shacham, F.L.3
Savage, S.4
-
32
-
-
34547251027
-
Side-channel attack pitfalls
-
New York, NY, USA DAC '07, ACM
-
TlRI, K. Side-channel attack pitfalls. In Proceedings of the 44th annual Design Automation Conference (New York, NY, USA, 2007), DAC '07, ACM, pp. 15-20.
-
(2007)
Proceedings of the 44th Annual Design Automation Conference
, pp. 15-20
-
-
Tlri, K.1
-
33
-
-
80955164530
-
-
WlKl. Magnetic stripe card, http://en.wikipedia.org/wiki/Magnetic-stripe- card.
-
-
-
-
34
-
-
84874282652
-
-
XENSOURCE. Xen credit scheduler, http://wiki.xensource.com/xenwiki/ CreditScheduler.
-
Xen Credit Scheduler
-
-
-
35
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
Oakland, CA, USA, May
-
ZHANG, Y., JUELS, A., OPREA, A., AND REITER, M. K. Homealone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (S&P'll) (Oakland, CA, USA, May 2011).
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy (S&P'll)
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|