메뉴 건너뛰기




Volumn , Issue , 2012, Pages 678-685

XenPump: A new method to mitigate timing channel in cloud computing

Author keywords

cloud computing; information flow; mitigation; Timing channel; virtualization; Xen

Indexed keywords

INFORMATION FLOWS; MITIGATION; TIMING CHANNELS; VIRTUALIZATIONS; XEN;

EID: 84866768367     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2012.28     Document Type: Conference Paper
Times cited : (69)

References (37)
  • 1
    • 80755187785 scopus 로고    scopus 로고
    • Predictive mitigation of timing channels in interactive systems
    • Proceedings of the 18th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
    • D. Zhang, A. Askarov, and A. C. Myers, "Predictive mitigation of timing channels in interactive systems," in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 563-574.
    • (2011) CCS '11 , pp. 563-574
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 2
    • 80955157902 scopus 로고    scopus 로고
    • An exploration of l2 cache covert channels in virtualized environments
    • Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
    • Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, "An exploration of l2 cache covert channels in virtualized environments," in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 29-40.
    • (2011) CCSW '11 , pp. 29-40
    • Xu, Y.1    Bailey, M.2    Jahanian, F.3    Joshi, K.4    Hiltunen, M.5    Schlichting, R.6
  • 4
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 5
    • 80052666134 scopus 로고    scopus 로고
    • Identification and evaluation of sharing memory covert timing channel in Xen virtual machines
    • Washington DC, USA
    • J. Wu, L. Ding, Y. Wang, and W. Han, "Identification and evaluation of sharing memory covert timing channel in Xen virtual machines," in IEEE CLOUD, Washington DC, USA, 2011, pp. 283-291.
    • (2011) IEEE CLOUD , pp. 283-291
    • Wu, J.1    Ding, L.2    Wang, Y.3    Han, W.4
  • 6
    • 81355163423 scopus 로고    scopus 로고
    • Research on key problems of covert channel in cloud computing
    • J. Wu, L. Ding, and Y. Wang, "Research on key problems of covert channel in cloud computing," Journal of Communications, vol. 32, no. 9A, pp. 184 - 203, 2011.
    • (2011) Journal of Communications , vol.32 , Issue.9 A , pp. 184-203
    • Wu, J.1    Ding, L.2    Wang, Y.3
  • 9
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
    • (2007) IEEE Communications Surveys and Tutorials , vol.9 , Issue.1-4 , pp. 44-57
    • Zander, S.1    Armitage, G.J.2    Branch, P.3
  • 10
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 11
    • 80052931252 scopus 로고    scopus 로고
    • A practical covert channel identification approach in source code based on directed information flow graph
    • Jeju Island, Korea
    • J. Wu, L. Ding, Y. Wang, and W. Han, "A practical covert channel identification approach in source code based on directed information flow graph," in IEEE SSIRI, Jeju Island, Korea, 2011, pp. 98-107.
    • (2011) IEEE SSIRI , pp. 98-107
    • Wu, J.1    Ding, L.2    Wang, Y.3    Han, W.4
  • 12
    • 80052683831 scopus 로고    scopus 로고
    • Constructing scenario of event-flag covert channel in secure operating system
    • Hongkong
    • J. Wu, Y. Wang, L. Ding, and Y. Zhang, "Constructing scenario of event-flag covert channel in secure operating system," in ICIMT, Hongkong, 2010, pp. 371-375.
    • (2010) ICIMT , pp. 371-375
    • Wu, J.1    Wang, Y.2    Ding, L.3    Zhang, Y.4
  • 13
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method. For secure real-time database using capacity metric
    • H. Zeng, Y. Wang, L. Ruan, W. Zu, and J. Cai, "Covert channel mitigation method. for secure real-time database using capacity metric," Journal on Communications, vol. 29, no. 8, pp. 46-56, 2008.
    • (2008) Journal on Communications , vol.29 , Issue.8 , pp. 46-56
    • Zeng, H.1    Wang, Y.2    Ruan, L.3    Zu, W.4    Cai, J.5
  • 14
    • 80052665981 scopus 로고    scopus 로고
    • Detecion approach for covert channel based concurrency conflict interval time
    • Y. Wang, J. Wu, L. Ding, and H. Zeng, "Detecion approach for covert channel based concurrency conflict interval time," Journal of Computer Research and Development, vol. 48, no. 8, pp. 1542-1553, 2011.
    • (2011) Journal of Computer Research and Development , vol.48 , Issue.8 , pp. 1542-1553
    • Wang, Y.1    Wu, J.2    Ding, L.3    Zeng, H.4
  • 16
    • 82755194868 scopus 로고    scopus 로고
    • Improving performance of network covert timing channel through huffman coding
    • J. Wu, Y. Wang, L. Ding, and X. Liao, "Improving performance of network covert timing channel through huffman coding," Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 69 - 79, 2012.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 69-79
    • Wu, J.1    Wang, Y.2    Ding, L.3    Liao, X.4
  • 18
    • 77954737019 scopus 로고    scopus 로고
    • Load-based covert channels between Xen virtual machines
    • K. Okamura and Y. Oyama, "Load-based covert channels between Xen virtual machines," in SAC, 2010, pp. 173-180.
    • (2010) SAC , pp. 173-180
    • Okamura, K.1    Oyama, Y.2
  • 19
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang, "Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity," in IEEE Symposium on Security and Privacy, 2010, pp. 380-395.
    • IEEE Symposium on Security and Privacy, 2010 , pp. 380-395
    • Wang, Z.1    Jiang, X.2
  • 20
    • 38349041413 scopus 로고    scopus 로고
    • A layered approach to simplified access control in virtualized systems
    • B. D. Payne, R. Sailer, R. Cáceres, R. Perez, and W. Lee, "A layered approach to simplified access control in virtualized systems," Operating Systems Review, vol. 41, no. 4, pp. 12-19, 2007.
    • (2007) Operating Systems Review , vol.41 , Issue.4 , pp. 12-19
    • Payne, B.D.1    Sailer, R.2    Cáceres, R.3    Perez, R.4    Lee, W.5
  • 26
    • 77950820630 scopus 로고    scopus 로고
    • Hima: A hypervisor-based integrity measurement agent
    • A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang, "Hima: A hypervisor-based integrity measurement agent," in ACSAC, 2009, pp. 461-470.
    • (2009) ACSAC , pp. 461-470
    • Azab, A.M.1    Ning, P.2    Sezer, E.C.3    Zhang, X.4
  • 27
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis," Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
    • (2009) Comput. Secur. , vol.28 , Issue.6 , pp. 421-432
    • Son, J.1    Alves-Foss, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.