메뉴 건너뛰기




Volumn 40, Issue 1, 2014, Pages 31-45

Counteracting security attacks in virtual machines in the cloud using property based attestation

Author keywords

Cloud; Malware; Rootkits; TPM attestation; Trusted computing; Virtual machine monitors; Zero day attacks

Indexed keywords

CLOUDS; DISTRIBUTED DATABASE SYSTEMS; SALES;

EID: 84896399206     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.08.002     Document Type: Article
Times cited : (23)

References (32)
  • 1
    • 84896392115 scopus 로고    scopus 로고
    • Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2)
    • Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2). 〈http://aws.amazon.com/ec2/âŒ.
  • 8
    • 84896396373 scopus 로고    scopus 로고
    • Flexiant Inc. Flexiscale public cloud
    • Flexiant Inc. Flexiscale public cloud. 〈http://www. flexiant.com/products/flexiscale/âŒ.
  • 15
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection and generation of software exploit attacks
    • February 2005
    • Newsome J, Song D. Dynamic taint analysis: automatic detection and generation of software exploit attacks. In: Proceedings of NDSS; February 2005.
    • Proceedings of NDSS
    • Newsome, J.1    Song, D.2
  • 17
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable 3rd generation architectures
    • G. Popek, and R. Goldberg Formal requirements for virtualizable 3rd generation architectures Communications of the ACM 17 7 1974 412 421
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.1    Goldberg, R.2
  • 20
    • 78751529749 scopus 로고    scopus 로고
    • Conficker and beyond: A large-scale empirical study
    • Texas, USA; December 2010
    • Shin Seungwon, Gu Guofei. Conficker and beyond: a large-scale empirical study. In: Proceedings of ACSAC 2010, Texas, USA; December 2010.
    • Proceedings of ACSAC 2010
    • Seungwon, S.1    Guofei, G.2
  • 23
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing Journal of Network and Computer Applications 34 1 2011 1 11
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 25
    • 84896399814 scopus 로고    scopus 로고
    • TCG. TPM main - part 1 design principles. Version 1.2, revision 103. Trusted Computing Group; July 2007
    • TCG. TPM main - part 1 design principles. Version 1.2, revision 103. Trusted Computing Group; July 2007.
  • 26
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Hassan Takabi, James B.D. Joshi, and Gail-Joon Ahn Security and privacy challenges in cloud computing environments IEEE Security & Privacy 2010
    • (2010) IEEE Security & Privacy
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 27
    • 84896394762 scopus 로고    scopus 로고
    • Team TR. Rackspace cloud
    • Team TR. Rackspace cloud. 〈http://www.rackspacecloud. com/âŒ.
  • 28
    • 84896392214 scopus 로고    scopus 로고
    • The Nimbus Team. Nimbus project
    • The Nimbus Team. Nimbus project. 〈http://www. nimbusproject.org/âŒ
  • 30
    • 84896393508 scopus 로고    scopus 로고
    • VMI tools
    • VMI tools. 〈https://code.google.com/p/vmitools/ âŒ
  • 31
    • 84896400452 scopus 로고    scopus 로고
    • XenAccess Library
    • XenAccess Library. Available at: 〈http://code.google. com/p/xenaccess/âŒ


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.