메뉴 건너뛰기




Volumn 13, Issue 2, 2014, Pages 171-189

On detecting co-resident cloud instances using network flow watermarking techniques

Author keywords

Cloud security; Covert channel; Traffic analysis

Indexed keywords

HARDWARE;

EID: 84897039338     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-013-0210-0     Document Type: Article
Times cited : (61)

References (58)
  • 1
    • 84897033763 scopus 로고    scopus 로고
    • Amazon EC2 Service Level Agreement
    • Amazon EC2 Service Level Agreement. http://aws. amazon. com/ec2-sla/.
  • 5
    • 77951282331 scopus 로고    scopus 로고
    • Empirical evaluation of latency-sensitive application performance in the cloud
    • MMSys '10, New York, ACM
    • Barker, S., Shenoy P.: Empirical evaluation of latency-sensitive application performance in the cloud In: Proceedings of 1st SCM SIGMM Conference on Multimedia Systems, MMSys '10, New York, pp. 34-46. ACM (2010).
    • (2010) Proceedings of 1st SCM SIGMM Conference on Multimedia Systems , pp. 34-46
    • Barker, S.1    Shenoy, P.2
  • 6
    • 33744529805 scopus 로고    scopus 로고
    • Cache-timing attacks on AES
    • Bernstein D. J.: Cache-timing attacks on AES. Compute (2005).
    • (2005) Compute
    • Bernstein, D.J.1
  • 14
    • 77950825753 scopus 로고    scopus 로고
    • Online sketching of network flows for real-time stepping-stone detection
    • ACSAC '09, Washington, IEEE Computer Society
    • Coskun, B., Memon, N.: Online sketching of network flows for real-time stepping-stone detection. In: Proceedings of 2009 Annual Computer Security Applications Conference, ACSAC '09, Washington, pp. 473-483. IEEE Computer Society (2009).
    • (2009) Proceedings of 2009 Annual Computer Security Applications Conference , pp. 473-483
    • Coskun, B.1    Memon, N.2
  • 15
    • 84897069595 scopus 로고    scopus 로고
    • CVE-2007-4993. pygrub (tools/pygrub/src/grubconf. py) in xen 3. 0. 3
    • CVE-2007-4993. pygrub (tools/pygrub/src/grubconf. py) in xen 3. 0. 3. http://cve. mitre. org/cgi-bin/cvename. cgi?name=CVE-2007-4993.
  • 18
    • 84863391249 scopus 로고    scopus 로고
    • SR-IOV networking in Xen: architecture, design and implementation
    • WIOV'08, Berkeley, USENIX Association
    • Dong, Y., Yu, Z., Rose, G.: SR-IOV networking in Xen: architecture, design and implementation. In: Proceedings of First Conference on I/O Virtualization, WIOV'08, Berkeley, p. 10. USENIX Association (2008).
    • (2008) Proceedings of First Conference on I/O Virtualization , pp. 10
    • Dong, Y.1    Yu, Z.2    Rose, G.3
  • 21
    • 67650685942 scopus 로고    scopus 로고
    • Enforcing performance isolation across virtual machines in Xen
    • Gupta, D., Cherkasova, L., Gardner, R., Vahdat, A.: Enforcing performance isolation across virtual machines in Xen. In: Middleware (2006).
    • (2006) Middleware
    • Gupta, D.1    Cherkasova, L.2    Gardner, R.3    Vahdat, A.4
  • 22
    • 70449709794 scopus 로고    scopus 로고
    • Virtualization with KVM
    • Habib, I.: Virtualization with KVM. Linux J. 166: 8(2008).
    • (2008) Linux J , vol.166 , pp. 8
    • Habib, I.1
  • 26
    • 51749105240 scopus 로고    scopus 로고
    • Non deterministic caches: a simple and effective defense against side channel attacks
    • Keramidas, G., Antonopoulos, A., Serpanos, D., Kaxiras, S.: Non deterministic caches: a simple and effective defense against side channel attacks. Design Autom. Embed. Syst. 12: 221-230 (2008).
    • (2008) Design Autom. Embed. Syst. , vol.12 , pp. 221-230
    • Keramidas, G.1    Antonopoulos, A.2    Serpanos, D.3    Kaxiras, S.4
  • 28
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Kocher, P. C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO, pp. 104-113 (1996).
    • (1996) CRYPTO , pp. 104-113
    • Kocher, P.C.1
  • 29
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO, pp. 388-397 (1999).
    • (1999) CRYPTO , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 30
    • 82655169619 scopus 로고    scopus 로고
    • Technical report, Intel Corporation
    • Kutch, P.: PCI-SIG SR-IOV Primer. Technical report, Intel Corporation (2011).
    • (2011) PCI-SIG SR-IOV Primer
    • Kutch, P.1
  • 39
    • 33646805500 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Percival, C.: Cache missing for fun and profit. In: BSDCan (2005).
    • (2005) BSDCan
    • Percival, C.1
  • 40
    • 0000564455 scopus 로고
    • The Kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data
    • Pettitt, A. N., Stephens, M. A.: The Kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data. Technometrics 19(2), 205-210 (1977).
    • (1977) Technometrics , vol.19 , Issue.2 , pp. 205-210
    • Pettitt, A.N.1    Stephens, M.A.2
  • 44
    • 80053503082 scopus 로고    scopus 로고
    • Runtime measurements in the cloud: observing, analyzing, and reducing variance
    • Schad, J., Dittrich, J., Quiané-Ruiz, J.-A.: Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proc. VLDB Endow. 3(1-2), 460-471 (2010).
    • (2010) Proc. VLDB Endow. , vol.3 , Issue.1-2 , pp. 460-471
    • Schad, J.1    Dittrich, J.2    Quiané-Ruiz, J.-A.3
  • 47
    • 0003428414 scopus 로고
    • Boston: Addison-Wesley Longman Publishing Co. Inc
    • Stevens, W. R.: TCP/IP Illustrated: The Protocols, vol. 1. Addison-Wesley Longman Publishing Co. Inc., Boston (1993).
    • (1993) TCP/IP Illustrated: The Protocols , vol.1
    • Stevens, W.R.1
  • 51
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • CCS '03, New York, ACM
    • Wang, X., Reeves, D. S.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS '03, New York, pp. 20-29. ACM (2003).
    • (2003) Proceedings of 10th ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.