-
1
-
-
78049348331
-
New results on instruction cache attacks
-
Springer
-
O. Aciiçmez, B. B. Brumley, and P. Grabher. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010, pages 110-124. Springer, 2010.
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES 2010
, pp. 110-124
-
-
Aciiçmez, O.1
Brumley, B.B.2
Grabher, P.3
-
2
-
-
85026210160
-
Chatty tenants and the cloud network sharing problem
-
USENIX Association
-
H. Ballani, K. Jang, T. Karagiannis, C. Kim, D. Gunawardena, and G. O'Shea. Chatty tenants and the cloud network sharing problem. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, pages 171-184. USENIX Association, 2013.
-
(2013)
Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation
, pp. 171-184
-
-
Ballani, H.1
Jang, K.2
Karagiannis, T.3
Kim, C.4
Gunawardena, D.5
O'Shea, G.6
-
3
-
-
84869782980
-
Detecting co-residency with active traffic analysis techniques
-
ACM
-
A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler. Detecting co-residency with active traffic analysis techniques. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pages 1-12. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop
, pp. 1-12
-
-
Bates, A.1
Mood, B.2
Pletcher, J.3
Pruse, H.4
Valafar, M.5
Butler, K.6
-
4
-
-
85076921347
-
The turtles project: Design and implementation of nested virtualization
-
M. Ben-Yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B.-A. Yassour. The turtles project: Design and implementation of nested virtualization. In OSDI, volume 10, pages 423-436, 2010.
-
(2010)
OSDI
, vol.10
, pp. 423-436
-
-
Ben-Yehuda, M.1
Day, M.D.2
Dubitzky, Z.3
Factor, M.4
Har'El, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.-A.9
-
5
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
ACM
-
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to tell if your cloud files are vulnerable to drive crashes. In Proceedings of the 18th ACM conference on Computer and communications security, pages 501-514. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 501-514
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
7
-
-
84888986732
-
Clouder: A framework for automatic software vulnerability location and patching in the cloud
-
ACM
-
P. Chen, D. Xu, and B. Mao. Clouder: a framework for automatic software vulnerability location and patching in the cloud. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pages 50-50. ACM, 2012.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 50-50
-
-
Chen, P.1
Xu, D.2
Mao, B.3
-
8
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
85032752298
-
Internet tomography
-
A. Coates, A. O. Hero III, R. Nowak, and B. Yu. Internet tomography. Signal Processing Magazine, IEEE, 19(3):47-65, 2002.
-
(2002)
Signal Processing Magazine, IEEE
, vol.19
, Issue.3
, pp. 47-65
-
-
Coates, A.1
Hero III, A.O.2
Nowak, R.3
Yu, B.4
-
10
-
-
84872068962
-
Managing and accessing data in the cloud: Privacy risks and approaches
-
IEEE
-
S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Managing and accessing data in the cloud: Privacy risks and approaches. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on, pages 1-9. IEEE, 2012.
-
(2012)
Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on
, pp. 1-9
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Samarati, P.3
-
12
-
-
80051974249
-
Cache games-bringing access-based cache attacks on aes to practice
-
IEEE
-
D. Gullasch, E. Bangerter, and S. Krenn. Cache games-bringing access-based cache attacks on aes to practice. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 490-505. IEEE, 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
, pp. 490-505
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
15
-
-
84873677485
-
New approaches to security and availability for cloud data
-
A. Juels and A. Oprea. New approaches to security and availability for cloud data. Communications of the ACM, 56(2):64-73, 2013.
-
(2013)
Communications of the ACM
, vol.56
, Issue.2
, pp. 64-73
-
-
Juels, A.1
Oprea, A.2
-
17
-
-
54049158161
-
I/O for Virtual Machine Monitors: Security and Performance Issues
-
P. A. Karger and D. R. Safford. I/O for Virtual Machine Monitors: Security and Performance Issues. IEEE Security & Privacy, 6(5):16-23, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.5
, pp. 16-23
-
-
Karger, P.A.1
Safford, D.R.2
-
18
-
-
84866390219
-
The meerkats cloud security architecture
-
IEEE
-
A. D. Keromytis, R. Geambasu, S. Sethumadhavan, S. J. Stolfo, J. Yang, A. Benameur, M. Dacier, M. Elder, D. Kienzle, and A. Stavrou. The meerkats cloud security architecture. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pages 446-450. IEEE, 2012.
-
(2012)
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on
, pp. 446-450
-
-
Keromytis, A.D.1
Geambasu, R.2
Sethumadhavan, S.3
Stolfo, S.J.4
Yang, J.5
Benameur, A.6
Dacier, M.7
Elder, M.8
Kienzle, D.9
Stavrou, A.10
-
20
-
-
84889046548
-
Apparatus and method for interrupt handling in a multi-threaded operating system kernel
-
May 7 US Patent 5,515,538
-
S. R. Kleiman. Apparatus and method for interrupt handling in a multi-threaded operating system kernel, May 7 1996. US Patent 5,515,538.
-
(1996)
-
-
Kleiman, S.R.1
-
21
-
-
0040291388
-
The click modular router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The click modular router. ACM Transactions on Computer Systems (TOCS), 18(3):263-297, 2000.
-
(2000)
ACM Transactions on Computer Systems (TOCS)
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
22
-
-
1242287727
-
Low-Rate TCP-Targeted Denial of Service Attacks: The Shrew vs. the Mice and Elephants
-
New York, NY, USA, ACM
-
A. Kuzmanovic and E. W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks: the Shrew vs. the Mice and Elephants. In SIGCOMM, pages 75-86, New York, NY, USA, 2003. ACM.
-
(2003)
SIGCOMM
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
23
-
-
70349653819
-
Architectural breakdown of end-to-end latency in a tcp/ip network
-
S. Larsen, P. Sarangam, R. Huggahalli, and S. Kulkarni. Architectural breakdown of end-to-end latency in a tcp/ip network. International Journal of Parallel Programming, 37(6):556-571, 2009.
-
(2009)
International Journal of Parallel Programming
, vol.37
, Issue.6
, pp. 556-571
-
-
Larsen, S.1
Sarangam, P.2
Huggahalli, R.3
Kulkarni, S.4
-
25
-
-
77953995401
-
Evaluating standard-based self-virtualizing devices: A performance study on 10 gbe nics with sr-iov support
-
IEEE
-
J. Liu. Evaluating standard-based self-virtualizing devices: A performance study on 10 gbe nics with sr-iov support. In Parallel & Distributed Processing (IPDPS), 2010 IEEE International Symposium on, pages 1-12. IEEE, 2010.
-
(2010)
Parallel & Distributed Processing (IPDPS), 2010 IEEE International Symposium on
, pp. 1-12
-
-
Liu, J.1
-
27
-
-
84864368309
-
Improving virtualization security by splitting hypervisor into smaller components
-
Springer
-
W. Pan, Y. Zhang, M. Yu, and J. Jing. Improving virtualization security by splitting hypervisor into smaller components. In Data and Applications Security and Privacy XXVI, pages 298-313. Springer, 2012.
-
(2012)
Data and Applications Security and Privacy XXVI
, pp. 298-313
-
-
Pan, W.1
Zhang, Y.2
Yu, M.3
Jing, J.4
-
28
-
-
84865546068
-
Cloudpolice: Taking access control out of the network
-
ACM
-
L. Popa, M. Yu, S. Y. Ko, S. Ratnasamy, and I. Stoica. Cloudpolice: taking access control out of the network. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, page 7. ACM, 2010.
-
(2010)
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
, pp. 7
-
-
Popa, L.1
Yu, M.2
Ko, S.Y.3
Ratnasamy, S.4
Stoica, I.5
-
29
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
ACM
-
H. Raj, R. Nathuji, A. Singh, and P. England. Resource management for isolation enhanced cloud services. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 77-84. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
31
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
34
-
-
35648972776
-
Performance analysis and comparison of interrupt-handling schemes in gigabit networks
-
K. Salah, K. El-Badawi, and F. Haidari. Performance analysis and comparison of interrupt-handling schemes in gigabit networks. Computer Communications, 30(17):3425-3441, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.17
, pp. 3425-3441
-
-
Salah, K.1
El-Badawi, K.2
Haidari, F.3
-
36
-
-
84892425852
-
Beyond softnet
-
J. H. Salim, R. Olsson, and A. Kuznetsov. Beyond softnet. In Proceedings of the 5th annual Linux Showcase & Conference, volume 5, pages 18-18, 2001.
-
(2001)
Proceedings of the 5th Annual Linux Showcase & Conference
, vol.5
, pp. 18
-
-
Salim, J.H.1
Olsson, R.2
Kuznetsov, A.3
-
38
-
-
80052143494
-
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring
-
IEEE
-
J. Shi, X. Song, H. Chen, and B. Zang. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, pages 194-199. IEEE, 2011.
-
(2011)
Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on
, pp. 194-199
-
-
Shi, J.1
Song, X.2
Chen, H.3
Zang, B.4
-
39
-
-
85054279156
-
-
N. C. A. System. September
-
N. C. A. System. Vulnerability Summary for CVE-2007-4993. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007- 4993, September 2007.
-
(2007)
Vulnerability Summary for CVE-2007-4993
-
-
-
40
-
-
84888985284
-
-
N. C. A. System. December
-
N. C. A. System. Vulnerability Summary for CVE-2007-5497. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007- 5497, December 2007.
-
(2007)
Vulnerability Summary for CVE-2007-5497
-
-
-
41
-
-
84888988766
-
-
N. C. A. System. March
-
N. C. A. System. Vulnerability Summary for CVE-2010-2240. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010- 2240, March 2010.
-
(2010)
Vulnerability Summary for CVE-2010-2240
-
-
-
42
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
ACM
-
J. Szefer, E. Keller, R. B. Lee, and J. Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on Computer and communications security, pages 401-412. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
43
-
-
74349098073
-
Efficient cache attacks on aes, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on aes, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
44
-
-
32844469374
-
System noise, os clock ticks, and fine-grained parallel applications
-
ACM
-
D. Tsafrir, Y. Etsion, D. G. Feitelson, and S. Kirkpatrick. System noise, os clock ticks, and fine-grained parallel applications. In Proceedings of the 19th annual international conference on Supercomputing, pages 303-312. ACM, 2005.
-
(2005)
Proceedings of the 19th Annual International Conference on Supercomputing
, pp. 303-312
-
-
Tsafrir, D.1
Etsion, Y.2
Feitelson, D.G.3
Kirkpatrick, S.4
-
45
-
-
34547699252
-
Concurrent direct network access for virtual machine monitors
-
IEEE
-
P. Willmann, J. Shafer, D. Carr, A. Menon, S. Rixner, A. L. Cox, and W. Zwaenepoel. Concurrent direct network access for virtual machine monitors. In High Performance Computer Architecture, 2007. HPCA 2007. IEEE 13th International Symposium on, pages 306-317. IEEE, 2007.
-
(2007)
High Performance Computer Architecture, 2007. HPCA 2007. IEEE 13th International Symposium on
, pp. 306-317
-
-
Willmann, P.1
Shafer, J.2
Carr, D.3
Menon, A.4
Rixner, S.5
Cox, A.L.6
Zwaenepoel, W.7
-
46
-
-
80955157902
-
An exploration of l2 cache covert channels in virtualized environments
-
ACM
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting. An exploration of l2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 29-40. ACM, 2011.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
47
-
-
77952337565
-
Estimating the impact of interrupt coalescing delays on steady state tcp throughput
-
Citeseer
-
M. Zec, M. Mikuc, and M. Zagar. Estimating the impact of interrupt coalescing delays on steady state tcp throughput. In Proceedings of the 10th SoftCOM, volume 2002. Citeseer, 2002.
-
(2002)
Proceedings of the 10th SoftCOM
, vol.2002
-
-
Zec, M.1
Mikuc, M.2
Zagar, M.3
-
48
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
ACM
-
F. Zhang, J. Chen, H. Chen, and B. Zang. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 203-216. ACM, 2011.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
49
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
IEEE
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 313-328. IEEE, 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
50
-
-
84869859962
-
Cross-vm side channels and their use to extract private keys
-
ACM
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-vm side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 305-316. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|