-
1
-
-
80755187785
-
Predictive mitigation of timing channels in interactive systems
-
Proceedings of the 18th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
-
D. Zhang, A. Askarov, and A. C. Myers, "Predictive mitigation of timing channels in interactive systems," in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 563-574.
-
(2011)
CCS '11
, pp. 563-574
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
2
-
-
80955157902
-
An exploration of l2 cache covert channels in virtualized environments
-
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, "An exploration of l2 cache covert channels in virtualized environments," in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 29-40.
-
(2011)
CCSW '11
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
3
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
A. O. Yinqian Zhang, Ari Juels and M. K. Reiter, "Homealone: Co-residency detection in the cloud via side-channel analysis," in IEEE Symposium on Security and Privacy, Oakland, California, 2011, pp. 313-328.
-
IEEE Symposium on Security and Privacy, Oakland, California, 2011
, pp. 313-328
-
-
Yinqian Zhang, A.O.1
Juels, A.2
Reiter, M.K.3
-
4
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
5
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in Xen virtual machines
-
Washington DC, USA
-
J. Wu, L. Ding, Y. Wang, and W. Han, "Identification and evaluation of sharing memory covert timing channel in Xen virtual machines," in IEEE CLOUD, Washington DC, USA, 2011, pp. 283-291.
-
(2011)
IEEE CLOUD
, pp. 283-291
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
Han, W.4
-
6
-
-
81355163423
-
Research on key problems of covert channel in cloud computing
-
J. Wu, L. Ding, and Y. Wang, "Research on key problems of covert channel in cloud computing," Journal of Communications, vol. 32, no. 9A, pp. 184 - 203, 2011.
-
(2011)
Journal of Communications
, vol.32
, Issue.9 A
, pp. 184-203
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
-
7
-
-
78650158728
-
Determinating timing channels in compute clouds
-
New York, NY, USA: ACM
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds," in CCSW '10: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. New York, NY, USA: ACM, 2010, pp. 103-108.
-
(2010)
CCSW '10: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
8
-
-
77957969195
-
Covert channel research
-
Y. Wang, J. Wu, H. Zeng, L. Ding, and X. Liao, "Covert channel research," Journal of Software, vol. 21, no. 9, pp. 2262-2288, 2010.
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2262-2288
-
-
Wang, Y.1
Wu, J.2
Zeng, H.3
Ding, L.4
Liao, X.5
-
9
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys and Tutorials, vol. 9, no. 1-4, pp. 44-57, 2007.
-
(2007)
IEEE Communications Surveys and Tutorials
, vol.9
, Issue.1-4
, pp. 44-57
-
-
Zander, S.1
Armitage, G.J.2
Branch, P.3
-
10
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Commun. ACM, vol. 16, no. 10, pp. 613-615, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
11
-
-
80052931252
-
A practical covert channel identification approach in source code based on directed information flow graph
-
Jeju Island, Korea
-
J. Wu, L. Ding, Y. Wang, and W. Han, "A practical covert channel identification approach in source code based on directed information flow graph," in IEEE SSIRI, Jeju Island, Korea, 2011, pp. 98-107.
-
(2011)
IEEE SSIRI
, pp. 98-107
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
Han, W.4
-
12
-
-
80052683831
-
Constructing scenario of event-flag covert channel in secure operating system
-
Hongkong
-
J. Wu, Y. Wang, L. Ding, and Y. Zhang, "Constructing scenario of event-flag covert channel in secure operating system," in ICIMT, Hongkong, 2010, pp. 371-375.
-
(2010)
ICIMT
, pp. 371-375
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Zhang, Y.4
-
13
-
-
51649119359
-
Covert channel mitigation method. For secure real-time database using capacity metric
-
H. Zeng, Y. Wang, L. Ruan, W. Zu, and J. Cai, "Covert channel mitigation method. for secure real-time database using capacity metric," Journal on Communications, vol. 29, no. 8, pp. 46-56, 2008.
-
(2008)
Journal on Communications
, vol.29
, Issue.8
, pp. 46-56
-
-
Zeng, H.1
Wang, Y.2
Ruan, L.3
Zu, W.4
Cai, J.5
-
14
-
-
80052665981
-
Detecion approach for covert channel based concurrency conflict interval time
-
Y. Wang, J. Wu, L. Ding, and H. Zeng, "Detecion approach for covert channel based concurrency conflict interval time," Journal of Computer Research and Development, vol. 48, no. 8, pp. 1542-1553, 2011.
-
(2011)
Journal of Computer Research and Development
, vol.48
, Issue.8
, pp. 1542-1553
-
-
Wang, Y.1
Wu, J.2
Ding, L.3
Zeng, H.4
-
15
-
-
14844330726
-
IP covert timing channels: Design and detection
-
S. Cabuk, C. E. Brodley, and C. Shields, "IP covert timing channels: design and detection," in ACM Conference on Computer and Communications Security, 2004, pp. 178-187.
-
ACM Conference on Computer and Communications Security, 2004
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
16
-
-
82755194868
-
Improving performance of network covert timing channel through huffman coding
-
J. Wu, Y. Wang, L. Ding, and X. Liao, "Improving performance of network covert timing channel through huffman coding," Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 69 - 79, 2012.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 69-79
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Liao, X.4
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in ACM Conference on Computer and Communications Security, 2009, pp. 199-212.
-
ACM Conference on Computer and Communications Security, 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
18
-
-
77954737019
-
Load-based covert channels between Xen virtual machines
-
K. Okamura and Y. Oyama, "Load-based covert channels between Xen virtual machines," in SAC, 2010, pp. 173-180.
-
(2010)
SAC
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
19
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang, "Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity," in IEEE Symposium on Security and Privacy, 2010, pp. 380-395.
-
IEEE Symposium on Security and Privacy, 2010
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
20
-
-
38349041413
-
A layered approach to simplified access control in virtualized systems
-
B. D. Payne, R. Sailer, R. Cáceres, R. Perez, and W. Lee, "A layered approach to simplified access control in virtualized systems," Operating Systems Review, vol. 41, no. 4, pp. 12-19, 2007.
-
(2007)
Operating Systems Review
, vol.41
, Issue.4
, pp. 12-19
-
-
Payne, B.D.1
Sailer, R.2
Cáceres, R.3
Perez, R.4
Lee, W.5
-
21
-
-
33750248123
-
Building a mac-based security architecture for the XenXen open-source hypervisor
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn, "Building a mac-based security architecture for the XenXen open-source hypervisor," in ACSAC, 2005, pp. 276-285.
-
(2005)
ACSAC
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
22
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in SOSP, 2003, pp. 164-177.
-
(2003)
SOSP
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
23
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. I. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization," in IEEE Symposium on Security and Privacy, 2008, pp. 233-247.
-
IEEE Symposium on Security and Privacy, 2008
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.I.3
Lee, W.4
-
24
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, "Hypersentry: enabling stealthy in-context measurement of hypervisor integrity," in ACM Conference on Computer and Communications Security, 2010, pp. 38-49.
-
ACM Conference on Computer and Communications Security, 2010
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
25
-
-
84894039099
-
Antfarm: Tracking processes in a virtual machine environment
-
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "Antfarm: Tracking processes in a virtual machine environment," in USENIX Annual Technical Conference, General Track, 2006, pp. 1-14.
-
USENIX Annual Technical Conference, General Track, 2006
, pp. 1-14
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
26
-
-
77950820630
-
Hima: A hypervisor-based integrity measurement agent
-
A. M. Azab, P. Ning, E. C. Sezer, and X. Zhang, "Hima: A hypervisor-based integrity measurement agent," in ACSAC, 2009, pp. 461-470.
-
(2009)
ACSAC
, pp. 461-470
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
Zhang, X.4
-
27
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
J. Son and J. Alves-Foss, "A formal framework for real-time information flow analysis," Comput. Secur., vol. 28, no. 6, pp. 421-432, 2009.
-
(2009)
Comput. Secur.
, vol.28
, Issue.6
, pp. 421-432
-
-
Son, J.1
Alves-Foss, J.2
-
31
-
-
0032075067
-
Learning string-edit distance
-
E. S. Ristad and P. N. Yianilos, "Learning string-edit distance," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 5, pp. 522-532, 1998.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.20
, Issue.5
, pp. 522-532
-
-
Ristad, E.S.1
Yianilos, P.N.2
-
32
-
-
0027719713
-
A pump for rapid, reliable, secure communication
-
M. H. Kang and I. S. Moskowitz, "A pump for rapid, reliable, secure communication," in ACM Conference on Computer and Communications Security, 1993, pp. 119-129.
-
ACM Conference on Computer and Communications Security, 1993
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
33
-
-
0000446356
-
A network pump
-
M. H. Kang, I. S. Moskowitz, and D. C. Lee, "A network pump," IEEE Trans. Software Eng., vol. 22, no. 5, pp. 329-338, 1996.
-
(1996)
IEEE Trans. Software Eng.
, vol.22
, Issue.5
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
34
-
-
0029220610
-
A network version of the pump
-
M. Kang, I. Moskowitz, and D. Lee, "A network version of the pump," in Security and Privacy, 1995. Proceedings., 1995 IEEE Symposium on, 1995, pp. 144 -154.
-
Security and Privacy, 1995. Proceedings., 1995 IEEE Symposium on, 1995
, pp. 144-154
-
-
Kang, M.1
Moskowitz, I.2
Lee, D.3
-
35
-
-
33846329830
-
The pump: A decade of covert fun
-
M. Kang, I. Moskowitz, and S. Chincheck, "The pump: a decade of covert fun," in Computer Security Applications Conference, 21st Annual, 2005, pp. 352-360.
-
Computer Security Applications Conference, 21st Annual, 2005
, pp. 352-360
-
-
Kang, M.1
Moskowitz, I.2
Chincheck, S.3
-
37
-
-
78650017523
-
Predictive blackbox mitigation of timing channels
-
A. Askarov, D. Zhang, and A. C. Myers, "Predictive blackbox mitigation of timing channels," in ACM Conference on Computer and Communications Security, 2010, pp. 297-307.
-
ACM Conference on Computer and Communications Security, 2010
, pp. 297-307
-
-
Askarov, A.1
Zhang, D.2
Myers, A.C.3
|