메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Mitigating access-driven timing channels in clouds using StopWatch

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN AND IMPLEMENTATIONS; EXTERNAL OBSERVER; NONOVERLAPPING; SIDE CHANNEL ATTACK; TIMING CHANNELS; VIRTUAL MACHINES;

EID: 84883333184     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2013.6575299     Document Type: Conference Paper
Times cited : (46)

References (44)
  • 2
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds, in 16th ACM CCS, 2009.
    • (2009) 16th ACM CCS
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 3
    • 0038239585 scopus 로고    scopus 로고
    • Median-based aggregation operators for prototype construction in ordinal scales
    • J. Domingo-Ferrer and V. Torra Median-based aggregation operators for prototype construction in ordinal scales, Intern. J. Intel. Sys., vol. 18, no. 6, 2003.
    • (2003) Intern. J. Intel. Sys , vol.18 , Issue.6
    • Domingo-Ferrer, J.1    Torra, V.2
  • 4
    • 79751507697 scopus 로고    scopus 로고
    • Microdata protection method through microaggregation: A median-based approach
    • M. E. Kabir and H. Wang Microdata protection method through microaggregation: A median-based approach, Information Security J.: A Global Perspective, vol. 20, 2011.
    • (2011) Information Security J.: A Global Perspective , vol.20
    • Kabir, M.E.1    Wang, H.2
  • 6
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • J. Agat Transforming out timing leaks, in 27th ACM POPL, 2000.
    • (2000) 27th ACM POPL
    • Agat, J.1
  • 7
    • 84942242915 scopus 로고    scopus 로고
    • Observational determinism for concurrent program security
    • S. Zdancewic and A. C. Myers Observational determinism for concurrent program security, in 16th IEEE CSFW, 2003.
    • (2003) 16th IEEE CSFW
    • Zdancewic, S.1    Myers, A.C.2
  • 8
    • 84863432828 scopus 로고    scopus 로고
    • Languagebased control and mitigation of timing channels
    • D. Zhang, A. Askarov, and A. C. Myers Languagebased control and mitigation of timing channels, in 33rd ACM PLDI, 2012.
    • (2012) 33rd ACM PLDI
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 9
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasures
    • E. Tromer, D. A. Osvik, and A. Shamir Efficient cache attacks on AES, and countermeasures, J. Cryptology, vol. 23, no. 1, 2010.
    • (2010) J. Cryptology , vol.23 , Issue.1
    • Tromer, E.1    Osvik, D.A.2    Shamir, A.3
  • 10
    • 74049131554 scopus 로고    scopus 로고
    • Resource management for isolation enhanced cloud services
    • H. Raj, R. Nathuji, A. Singh, and P. England Resource management for isolation enhanced cloud services, in ACM CCSW, 2009.
    • (2009) ACM CCSW
    • Raj, H.1    Nathuji, R.2    Singh, A.3    England, P.4
  • 11
    • 85073538603 scopus 로고    scopus 로고
    • STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud
    • T. Kim, M. Peinado, and G. Mainar-Ruiz STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud, in 21st USENIX Security Symp., 2012.
    • (2012) 21st USENIX Security Symp
    • Kim, T.1    Peinado, M.2    Mainar-Ruiz, G.3
  • 12
    • 78650017523 scopus 로고    scopus 로고
    • Predictive black-box mitigation of timing channels
    • A. Askarov, A. C. Myers, and D. Zhang Predictive black-box mitigation of timing channels, in 17th ACM CCS, 2010.
    • (2010) 17th ACM CCS
    • Askarov, A.1    Myers, A.C.2    Zhang, D.3
  • 14
    • 0027719713 scopus 로고
    • A pump for rapid, reliable, secure communication
    • M. H. Kang and I. S. Moskowitz A pump for rapid, reliable, secure communication, in ACM CCS, 1993.
    • (1993) ACM CCS
    • Kang, M.H.1    Moskowitz, I.S.2
  • 15
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • J. Giles and B. Hajek An information-theoretic and game-theoretic study of timing channels, IEEE TOIT, vol. 48, no. 9, 2002.
    • (2002) IEEE TOIT , vol.48 , Issue.9
    • Giles, J.1    Hajek, B.2
  • 17
    • 80755187785 scopus 로고    scopus 로고
    • Predictive mitigation of timing channels in interactive systems
    • D. Zhang, A. Askarov, and A. C. Myers Predictive mitigation of timing channels in interactive systems, in 18th ACM CCS, 2011.
    • (2011) 18th ACM CCS
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 18
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. B. Schneider Implementing fault-tolerant services using the state machine approach: A tutorial, ACM Comp. Surv., vol. 22, no. 4, 1990.
    • (1990) ACM Comp. Surv , vol.22 , Issue.4
    • Schneider, F.B.1
  • 20
    • 84883338701 scopus 로고    scopus 로고
    • Enforcing determinism for the consistent replication of multithreaded CORBA applications
    • P. Narasimhan, L. E. Moser, and P. M. Melliar-Smith Enforcing determinism for the consistent replication of multithreaded CORBA applications, in IEEE SRDS, 1999.
    • (1999) IEEE SRDS
    • Narasimhan, P.1    Moser, L.E.2    Melliar-Smith, P.M.3
  • 21
    • 33645820246 scopus 로고    scopus 로고
    • Active replication of multithreaded applications
    • C. Basile, Z. Kalbarczyk, and R. K. Iyer Active replication of multithreaded applications, IEEE TPDS, vol. 17, no. 5, 2006.
    • (2006) IEEE TPDS , vol.17 , Issue.5
    • Basile, C.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 22
    • 0030086704 scopus 로고    scopus 로고
    • Hypervisor-based fault-tolerance
    • T. C. Bressoud and F. B. Schneider Hypervisor-based fault-tolerance, ACM TOCS, vol. 14, no. 1, 1996.
    • (1996) ACM TOCS , vol.14 , Issue.1
    • Bressoud, T.C.1    Schneider, F.B.2
  • 24
    • 33750340695 scopus 로고    scopus 로고
    • Behavioral distance for intrusion detection
    • D. Gao, M. K. Reiter, and D. Song Behavioral distance for intrusion detection, in 8th RAID, 2005.
    • (2005) 8th RAID
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 27
    • 67649202948 scopus 로고    scopus 로고
    • Beyond output voting: Detecting compromised replicas using HMMbased behavioral distance
    • D. Gao, M. K. Reiter, and D. Song Beyond output voting: Detecting compromised replicas using HMMbased behavioral distance, IEEE TDSC, vol. 6, no. 2, 2009.
    • (2009) IEEE TDSC , vol.6 , Issue.2
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 30
    • 77949581334 scopus 로고    scopus 로고
    • DMP: Deterministic shared memory multiprocessing
    • J. Devietti, B. Lucia, L. Ceze, and M. Oskin DMP: Deterministic shared memory multiprocessing, IEEE Micro, vol. 30, pp. 41-49, 2010.
    • (2010) IEEE Micro , vol.30 , pp. 41-49
    • Devietti, J.1    Lucia, B.2    Ceze, L.3    Oskin, M.4
  • 35
    • 84883346620 scopus 로고    scopus 로고
    • Timekeeping in VMware Virtual Machines, VMWare Inc., 2010
    • Timekeeping in VMware Virtual Machines, VMWare Inc., 2010.
  • 41
    • 79960963624 scopus 로고    scopus 로고
    • Maximum packing of the complete graph with uniform length cycles
    • D. Horsley Maximum packing of the complete graph with uniform length cycles, J. Graph Theory, vol. 68, no. 1, 2011.
    • (2011) J. Graph Theory , vol.68 , Issue.1
    • Horsley, D.1
  • 44
    • 67650722766 scopus 로고    scopus 로고
    • Distributions of order statistics
    • M. Gungor, Y. Bulut, and S. C? al?k Distributions of order statistics, Appl. Math. Sci., vol. 3, no. 16, 2009.
    • (2009) Appl. Math. Sci , vol.3 , Issue.16
    • Gungor, M.1    Bulut, Y.2    Calk, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.