-
1
-
-
84870722474
-
-
Amazon EC2 Service Level Agreement
-
Amazon EC2 Service Level Agreement. http://aws.amazon.com/ec2-sla/.
-
-
-
-
3
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, University of California, Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, et al. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, University of California, Berkeley, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA, ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proc. 19th ACM Symp. on Operating Systems Principles, SOSP '03, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
Proc. 19th ACM Symp. on Operating Systems Principles, SOSP '03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
Chicago, IL, USA
-
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. In CCS '11: Proc. 18th ACM Conf. on Computer and Communications Security, pages 501-514, Chicago, IL, USA, 2011.
-
(2011)
CCS '11: Proc. 18th ACM Conf. on Computer and Communications Security
, pp. 501-514
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
8
-
-
14844330726
-
Ip covert timing channels: Design and detection
-
New York, NY, USA, ACM
-
S. Cabuk, C. E. Brodley, and C. Shields. Ip covert timing channels: design and detection. In Proc. 11th ACM conference on Computer and communications security, CCS '04, pages 178-187, New York, NY, USA, 2004. ACM.
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security, CCS '04
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
11
-
-
77950825753
-
Online sketching of network flows for real-time stepping-stone detection
-
Washington, DC, USA, IEEE Computer Society
-
B. Coskun and N. Memon. Online sketching of network flows for real-time stepping-stone detection. In Proc. 2009 Annual Computer Security Applications Conf., ACSAC '09, pages 473-483, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proc. 2009 Annual Computer Security Applications Conf., ACSAC '09
, pp. 473-483
-
-
Coskun, B.1
Memon, N.2
-
12
-
-
84870713306
-
-
CVE-2007-4993. pygrub (tools/pygrub/src/grubconf.py) in xen 3.0.3
-
CVE-2007-4993. pygrub (tools/pygrub/src/grubconf.py) in xen 3.0.3. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-4993.
-
-
-
-
13
-
-
84870668999
-
-
CVE-2007-5497. Multiple integer overflows in libext2fs
-
CVE-2007-5497. Multiple integer overflows in libext2fs. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-5497.
-
-
-
-
14
-
-
84870675019
-
-
CVE-2010-2240. The doanonymouspage function in mm/memory.c
-
CVE-2010-2240. The doanonymouspage function in mm/memory.c. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2010-2240.
-
-
-
-
15
-
-
84863391249
-
SR-IOV networking in xen: Architecture, design and implementation
-
Berkeley, CA, USA, USENIX Association
-
Y. Dong, Z. Yu, and G. Rose. SR-IOV Networking in Xen: Architecture, Design and Implementation. In Proc. First Conf. on I/O Virtualization, WIOV'08, page 10, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proc. First Conf. on I/O Virtualization, WIOV'08
, pp. 10
-
-
Dong, Y.1
Yu, Z.2
Rose, G.3
-
16
-
-
82155203093
-
Opportunistic flooding to improve TCP transmit performance in virtualized clouds
-
New York, NY, USA, ACM
-
S. Gamage, A. Kangarlou, R. R. Kompella, and D. Xu. Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Clouds. In Proc. 2nd ACM Symp. on Cloud Computing, SOCC '11, pages 1-14, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. 2nd ACM Symp. on Cloud Computing, SOCC '11
, pp. 1-14
-
-
Gamage, S.1
Kangarlou, A.2
Kompella, R.R.3
Xu, D.4
-
19
-
-
70449709794
-
Virtualization with KVM
-
Feb
-
I. Habib. Virtualization with KVM. Linux Journal, Feb. 2008.
-
(2008)
Linux Journal
-
-
Habib, I.1
-
23
-
-
51749105240
-
Non deterministic caches: A simple and effective defense against side channel attacks
-
G. Keramidas, A. Antonopoulos, D. Serpanos, and S. Kaxiras. Non Deterministic Caches: A Simple and Effective Defense Against Side Channel Attacks. Design Automation for Embedded Systems, pages 221-230, 2008.
-
(2008)
Design Automation for Embedded Systems
, pp. 221-230
-
-
Keramidas, G.1
Antonopoulos, A.2
Serpanos, D.3
Kaxiras, S.4
-
25
-
-
82655169619
-
-
Technical report, Intel Corporation
-
P. Kutch. PCI-SIG SR-IOV Primer. Technical report, Intel Corporation, 2011.
-
(2011)
PCI-SIG SR-IOV Primer
-
-
Kutch, P.1
-
29
-
-
84862967527
-
Exposing invisible timing-based traffic watermarks with BACKLIT
-
Orlando, FL, USA, Dec
-
X. Luo, P. Zhou, J. Zhang, R. Perdisci, W. Lee, and R. K. C. Chang. Exposing Invisible Timing-based Traffic Watermarks with BACKLIT. In Proc. 27th Ann. Comp. Sec. Applications Conf., ACSAC '11, Orlando, FL, USA, Dec. 2011.
-
(2011)
Proc. 27th Ann. Comp. Sec. Applications Conf., ACSAC '11
-
-
Luo, X.1
Zhou, P.2
Zhang, J.3
Perdisci, R.4
Lee, W.5
Chang, R.K.C.6
-
30
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
Oakland, CA, USA, May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proc. 2010 IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2010.
-
(2010)
Proc. 2010 IEEE Symp. on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
33
-
-
33751040560
-
On the secrecy of timing-based active watermarking trace-back techniques
-
Oakland, CA, USA
-
P. Peng, P. Ning, and D. S. Reeves. On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. In Proc. 2006 IEEE Symp. on Security and Privacy, Oakland, CA, USA, 2006.
-
(2006)
Proc. 2006 IEEE Symp. on Security and Privacy
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
-
34
-
-
0000564455
-
The kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data
-
A. N. Pettitt and M. A. Stephens. The Kolmogorov-Smirnov Goodness-of-Fit Statistic with Discrete and Grouped Data. Technometrics, 19(2):205-210, 1977.
-
(1977)
Technometrics
, vol.19
, Issue.2
, pp. 205-210
-
-
Pettitt, A.N.1
Stephens, M.A.2
-
35
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
Chicago, IL, USA
-
H. Raj, R. Nathuji, A. Singh, and P. England. Resource Management for Isolation Enhanced Cloud Services. In Proc. 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Chicago, IL, USA, 2009.
-
(2009)
Proc. 2009 ACM Workshop on Cloud Computing Security, CCSW '09
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
36
-
-
84869784931
-
-
Xen Summit, Febuary
-
K. K. Ram, J. R. Santos, Y. Turner, A. L. Cox, A. L. Cox, and S. Rixner. Achieving 10 Gb/s using Xen Para-virtualized Network Drivers. Xen Summit, Febuary 2009.
-
(2009)
Achieving 10 Gb/s Using Xen Para-virtualized Network Drivers
-
-
Ram, K.K.1
Santos, J.R.2
Turner, Y.3
Cox, A.L.4
Cox, A.L.5
Rixner, S.6
-
37
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, IL, USA, October
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS'09: Proc. 16th ACM Conf. on Computer and Communications Security, Chicago, IL, USA, October 2009.
-
(2009)
CCS'09: Proc. 16th ACM Conf. on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
38
-
-
80053503082
-
Runtime measurements in the cloud: Observing, analyzing, and reducing variance
-
Sept
-
J. Schad, J. Dittrich, and J.-A. Quiané-Ruiz. Runtime Measurements in the Cloud: Observing, Analyzing, and Reducing Variance. Proc. VLDB Endowment, 3(1-2):460-471, Sept. 2010.
-
(2010)
Proc. VLDB Endowment
, vol.3
, Issue.1-2
, pp. 460-471
-
-
Schad, J.1
Dittrich, J.2
Quiané-Ruiz, J.-A.3
-
39
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson, WA, USA
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In SOSP'07: Proc. 21st ACM Symp. on Operating Systems Principles, Stevenson, WA, USA, 2007.
-
(2007)
SOSP'07: Proc. 21st ACM Symp. on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
40
-
-
0003428414
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
W. R. Stevens. TCP/IP illustrated (vol. 1): the protocols. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1993.
-
(1993)
TCP/IP Illustrated (Vol. 1): The Protocols
-
-
Stevens, W.R.1
-
41
-
-
84870655070
-
-
VMSA-2008-0008. VMware ACE, VMware Fusion Resolve Critical Security Issues
-
VMSA-2008-0008. Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion Resolve Critical Security Issues. http://www.vmware.com/security/ advisories/VMSA-2008-0008.html.
-
Updates to VMware Workstation, VMware Player
-
-
-
42
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
Oakland, CA, USA, May
-
X. Wang, S. Chen, and S. Jajodia. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. In Proc. 2007 IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2007.
-
(2007)
Proc. 2007 IEEE Symp. on Security and Privacy
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
43
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
New York, NY, USA, ACM
-
X. Wang and D. S. Reeves. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays. In Proc. 10th ACM conference on Computer and communications security, CCS '03, pages 20-29, New York, NY, USA, 2003. ACM.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
45
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Nov
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting. An Exploration of L2 Cache Covert Channels in Virtualized Environments. In Proc. 3rd ACM Workshop on Cloud Computing Security (CCSW'11), Nov. 2011.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security (CCSW'11)
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
46
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao. DSSS-Based Flow Marking Technique for Invisible Traceback. In Proc. 2007 IEEE Symp. on Security and Privacy, May 2007.
-
(2007)
Proc. 2007 IEEE Symp. on Security and Privacy
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
47
-
-
80052008862
-
Home alone: Co-residency detection in the cloud via side-channel analysis
-
Berkeley, CA, USA, May
-
Y. Zhang, A. Juels, A. Oprea, and M. Reiter. HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. In Proc. 2011 IEEE Symp. on Security and Privacy, Berkeley, CA, USA, May 2011.
-
(2011)
Proc. 2011 IEEE Symp. on Security and Privacy
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.4
|