메뉴 건너뛰기




Volumn 8, Issue 3, 2012, Pages 85-97

On covert channels between virtual machines

Author keywords

[No Author keywords available]

Indexed keywords

COVERT CHANNELS; DATA LEAKAGE; EXPERIMENTAL STUDIES; HARDWARE UTILIZATION; INFORMATION FLOWS; INFORMATION LEAKAGE; NETWORK COVERT CHANNEL; NETWORK-BASED; SECURITY THREATS; VIRTUAL MACHINE MONITORS; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 84864462530     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-012-0168-x     Document Type: Article
Times cited : (19)

References (26)
  • 1
    • 84864434012 scopus 로고    scopus 로고
    • Accessed 10 Nov
    • 3-way handshake. http://www. 3wayhandshake. com. Accessed 10 Nov 2010.
    • (2010) 3-way handshake
  • 2
    • 84864434011 scopus 로고    scopus 로고
    • ATA over Ethernet, Accessed 10 Nov
    • ATA over Ethernet. http://en. wikipedia. org/wiki/ATA_over_Ethernet. Accessed 10 Nov 2010.
    • (2010)
  • 5
    • 84864472302 scopus 로고    scopus 로고
    • Full-virtualization, Accessed 10 Nov
    • Full-virtualization. http://en. wikipedia. org/wiki/Full_virtualization. Accessed 10 Nov 2010.
    • (2010)
  • 12
    • 32444450372 scopus 로고    scopus 로고
    • Embedding Covert Channels into TCP/IP
    • Berlin: Springer
    • Murdoch S., Lewis S.: Embedding covert channels into TCP/IP. In: Information Hiding, pp. 247-261. Springer, Berlin (2005).
    • (2005) Information Hiding , pp. 247-261
    • Murdoch, S.1    Lewis, S.2
  • 15
    • 84864472300 scopus 로고    scopus 로고
    • Paravirtualization. Accessed 10 Nov
    • Paravirtualization. http://en. wikipedia. org/wiki/Paravirtualization. Accessed 10 Nov 2010.
    • (2010)
  • 17
    • 20344383743 scopus 로고    scopus 로고
    • Virtual machine monitors: current technology and future trends
    • Rosenblum M., Garfinkel T.: Virtual machine monitors: current technology and future trends. Computer 38(5), 39-47 (2005).
    • (2005) Computer , vol.38 , Issue.5 , pp. 39-47
    • Rosenblum, M.1    Garfinkel, T.2
  • 18
    • 84864456357 scopus 로고    scopus 로고
    • Rredhat virtualization guide. Accessed 10 Nov 2010
    • Rredhat virtualization guide. http://www. centos. org/docs/5/html/5. 1/pdf/Virtualization. pdf. Accessed 10 Nov 2010.
    • (2010)
  • 22
    • 84864472303 scopus 로고    scopus 로고
    • TCP sequence prediction attack. Accessed 10 Nov
    • TCP sequence prediction attack. http://en. wikipedia. org/wiki/TCP_Sequence_Prediction_Attack. Accessed 10 Nov 2010.
    • (2010)
  • 23
    • 84864456358 scopus 로고    scopus 로고
    • Transmission Control Protocol. Accessed 10 Nov
    • Transmission Control Protocol. http://en. wikipedia. org/wiki/Transmission_Control_Protocol. Accessed 10 Nov 2010.
    • (2010)
  • 25
    • 84864456360 scopus 로고    scopus 로고
    • Virtualization Security Survey, Accessed 10 Nov 2010
    • Virtualization Security Survey. http://www. prismmicrosys. com/documents/VirtualizationSecuritySurvey2010. pdf (2010). Accessed 10 Nov 2010.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.