-
1
-
-
84897033763
-
-
Amazon EC2 Service Level Agreement
-
Amazon EC2 Service Level Agreement. http://aws. amazon. com/ec2-sla/.
-
-
-
-
3
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., et al.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, University of California, Berkeley (2009).
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP '03, New York, ACM
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield A.: Xen and the art of virtualization. In: Proceedings of 19th ACM Symposium on Operating Systems Principles, SOSP '03, New York, pp. 164-177. ACM (2003).
-
(2003)
Proceedings of 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
77951282331
-
Empirical evaluation of latency-sensitive application performance in the cloud
-
MMSys '10, New York, ACM
-
Barker, S., Shenoy P.: Empirical evaluation of latency-sensitive application performance in the cloud In: Proceedings of 1st SCM SIGMM Conference on Multimedia Systems, MMSys '10, New York, pp. 34-46. ACM (2010).
-
(2010)
Proceedings of 1st SCM SIGMM Conference on Multimedia Systems
, pp. 34-46
-
-
Barker, S.1
Shenoy, P.2
-
6
-
-
33744529805
-
Cache-timing attacks on AES
-
Bernstein D. J.: Cache-timing attacks on AES. Compute (2005).
-
(2005)
Compute
-
-
Bernstein, D.J.1
-
8
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
Chicago
-
Bowers, K. D., van Dijk, M., Juels, A., Oprea, A., Rivest R. L.: How to tell if your cloud files are vulnerable to drive crashes. In: CCS '11: Proceedings of 18th ACM Conference on Computer and Communications Security, Chicago, pp. 501-514 (2011).
-
(2011)
CCS '11: Proceedings of 18th ACM Conference on Computer and Communications Security
, pp. 501-514
-
-
Bowers, K.D.1
van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
10
-
-
84869447330
-
Self-service cloud computing
-
Raleigh
-
Butt, S., Lagar-Cavilla, H. A., Srivastava, A., Ganapathy V.: Self-service cloud computing. In: Proceedings of 2012 ACM Conference on Computer and Communications Security, Raleigh (2012).
-
(2012)
Proceedings of 2012 ACM Conference on Computer and Communications Security
-
-
Butt, S.1
Lagar-Cavilla, H.A.2
Srivastava, A.3
Ganapathy, V.4
-
11
-
-
14844330726
-
Ip covert timing channels: design and detection
-
CCS '04, New York, ACM
-
Cabuk, S., Brodley, C. E., Shields C.: Ip covert timing channels: design and detection. In: Proceedings of 11th ACM Conference on Computer and Communications Security, CCS '04, New York, pp. 178-187. ACM (2004).
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
12
-
-
76849086598
-
IP Covert Channel Detection
-
Cabuk, S., Brodley, C. E., Shields C.: IP Covert Channel Detection. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(4): 1-29 (2009).
-
(2009)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.12
, Issue.4
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
14
-
-
77950825753
-
Online sketching of network flows for real-time stepping-stone detection
-
ACSAC '09, Washington, IEEE Computer Society
-
Coskun, B., Memon, N.: Online sketching of network flows for real-time stepping-stone detection. In: Proceedings of 2009 Annual Computer Security Applications Conference, ACSAC '09, Washington, pp. 473-483. IEEE Computer Society (2009).
-
(2009)
Proceedings of 2009 Annual Computer Security Applications Conference
, pp. 473-483
-
-
Coskun, B.1
Memon, N.2
-
15
-
-
84897069595
-
-
CVE-2007-4993. pygrub (tools/pygrub/src/grubconf. py) in xen 3. 0. 3
-
CVE-2007-4993. pygrub (tools/pygrub/src/grubconf. py) in xen 3. 0. 3. http://cve. mitre. org/cgi-bin/cvename. cgi?name=CVE-2007-4993.
-
-
-
-
18
-
-
84863391249
-
SR-IOV networking in Xen: architecture, design and implementation
-
WIOV'08, Berkeley, USENIX Association
-
Dong, Y., Yu, Z., Rose, G.: SR-IOV networking in Xen: architecture, design and implementation. In: Proceedings of First Conference on I/O Virtualization, WIOV'08, Berkeley, p. 10. USENIX Association (2008).
-
(2008)
Proceedings of First Conference on I/O Virtualization
, pp. 10
-
-
Dong, Y.1
Yu, Z.2
Rose, G.3
-
19
-
-
82155203093
-
Opportunistic flooding to improve TCP transmit performance in virtualized clouds
-
SOCC '11, New York, ACM
-
Gamage, S., Kangarlou, A., Kompella, R. R., Xu, D.: Opportunistic flooding to improve TCP transmit performance in virtualized clouds. In: Proceedings of 2nd ACM Symposium on Cloud Computing, SOCC '11, New York, pp. 1-14. ACM (2011).
-
(2011)
Proceedings of 2nd ACM Symposium on Cloud Computing
, pp. 1-14
-
-
Gamage, S.1
Kangarlou, A.2
Kompella, R.R.3
Xu, D.4
-
21
-
-
67650685942
-
Enforcing performance isolation across virtual machines in Xen
-
Gupta, D., Cherkasova, L., Gardner, R., Vahdat, A.: Enforcing performance isolation across virtual machines in Xen. In: Middleware (2006).
-
(2006)
Middleware
-
-
Gupta, D.1
Cherkasova, L.2
Gardner, R.3
Vahdat, A.4
-
22
-
-
70449709794
-
Virtualization with KVM
-
Habib, I.: Virtualization with KVM. Linux J. 166: 8(2008).
-
(2008)
Linux J
, vol.166
, pp. 8
-
-
Habib, I.1
-
25
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
Security (CCS'11)
-
Keller, E., Szefer, J., Rexford, J., Lee, R. B.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of ACM Conference on Computer and Communications, Security (CCS'11) (2011).
-
(2011)
Proceedings of ACM Conference on Computer and Communications
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
26
-
-
51749105240
-
Non deterministic caches: a simple and effective defense against side channel attacks
-
Keramidas, G., Antonopoulos, A., Serpanos, D., Kaxiras, S.: Non deterministic caches: a simple and effective defense against side channel attacks. Design Autom. Embed. Syst. 12: 221-230 (2008).
-
(2008)
Design Autom. Embed. Syst.
, vol.12
, pp. 221-230
-
-
Keramidas, G.1
Antonopoulos, A.2
Serpanos, D.3
Kaxiras, S.4
-
28
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Kocher, P. C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO, pp. 104-113 (1996).
-
(1996)
CRYPTO
, pp. 104-113
-
-
Kocher, P.C.1
-
29
-
-
84939573910
-
Differential power analysis
-
Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO, pp. 388-397 (1999).
-
(1999)
CRYPTO
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
30
-
-
82655169619
-
-
Technical report, Intel Corporation
-
Kutch, P.: PCI-SIG SR-IOV Primer. Technical report, Intel Corporation (2011).
-
(2011)
PCI-SIG SR-IOV Primer
-
-
Kutch, P.1
-
33
-
-
78049368157
-
On the secrecy of spread-spectrum flow watermarks
-
Luo, X., Zhang, J., Perdisci, R., Lee, W.: On the secrecy of spread-spectrum flow watermarks. In: Proceedings of European Symposium on Research in Computer Security ESORICS (2010).
-
(2010)
Proceedings of European Symposium on Research in Computer Security ESORICS
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
-
34
-
-
84862967527
-
Exposing invisible timing-based traffic watermarks with BACKLIT
-
ACSAC '11, Orlando
-
Luo, X., Zhou, P., Zhang, J., Perdisci, R., Lee, W., Chang, R. K. C.: Exposing invisible timing-based traffic watermarks with BACKLIT. In: Proceedings of 27th Annual Computer Security Applications Conference, ACSAC '11, Orlando (2011).
-
(2011)
Proceedings of 27th Annual Computer Security Applications Conference
-
-
Luo, X.1
Zhou, P.2
Zhang, J.3
Perdisci, R.4
Lee, W.5
Chang, R.K.C.6
-
35
-
-
77955186544
-
TrustVisor: efficient TCB reduction and attestation
-
Oakland
-
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: efficient TCB reduction and attestation. In: Proceedings of 2010 IEEE Symposium on Security and Privacy, Oakland (2010).
-
(2010)
Proceedings of 2010 IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
39
-
-
33646805500
-
Cache missing for fun and profit
-
Percival, C.: Cache missing for fun and profit. In: BSDCan (2005).
-
(2005)
BSDCan
-
-
Percival, C.1
-
40
-
-
0000564455
-
The Kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data
-
Pettitt, A. N., Stephens, M. A.: The Kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data. Technometrics 19(2), 205-210 (1977).
-
(1977)
Technometrics
, vol.19
, Issue.2
, pp. 205-210
-
-
Pettitt, A.N.1
Stephens, M.A.2
-
41
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
CCSW '09, Chicago
-
Raj, H., Nathuji, R., Singh, A., England, P.: Resource management for isolation enhanced cloud services. In: Proceedings of 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Chicago (2009).
-
(2009)
Proceedings of 2009 ACM Workshop on Cloud Computing Security
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
42
-
-
84897082196
-
Achieving 10 GB/s using Xen para-virtualized network drivers
-
Ram, K. K., Santos, J. R., Turner, Y., Cox, A. L., Cox, A. L., Rixner, S.: Achieving 10 GB/s using Xen para-virtualized network drivers. Xen Summit (2009).
-
(2009)
Xen Summit
-
-
Ram, K.K.1
Santos, J.R.2
Turner, Y.3
Cox, A.L.4
Cox, A.L.5
Rixner, S.6
-
43
-
-
74049152260
-
Hey, You, Get off of my cloud: exploring information leakage in third-party compute clouds
-
Chicago
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS'09: Proceedings of 16th ACM Conference on Computer and Communications Security, Chicago (2009).
-
(2009)
CCS'09: Proceedings of 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
44
-
-
80053503082
-
Runtime measurements in the cloud: observing, analyzing, and reducing variance
-
Schad, J., Dittrich, J., Quiané-Ruiz, J.-A.: Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proc. VLDB Endow. 3(1-2), 460-471 (2010).
-
(2010)
Proc. VLDB Endow.
, vol.3
, Issue.1-2
, pp. 460-471
-
-
Schad, J.1
Dittrich, J.2
Quiané-Ruiz, J.-A.3
-
45
-
-
41149103393
-
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Stevenson
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: SOSP'07: Proceedings of 21st ACM Symposium on Operating Systems Principles, Stevenson (2007).
-
(2007)
SOSP'07: Proceedings of 21st ACM Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
47
-
-
0003428414
-
-
Boston: Addison-Wesley Longman Publishing Co. Inc
-
Stevens, W. R.: TCP/IP Illustrated: The Protocols, vol. 1. Addison-Wesley Longman Publishing Co. Inc., Boston (1993).
-
(1993)
TCP/IP Illustrated: The Protocols
, vol.1
-
-
Stevens, W.R.1
-
48
-
-
84869441988
-
Resource-freeing attacks: improve your cloud performance (at Your Neighbor's Expense)
-
Raleigh
-
Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., Swift, M. M.: Resource-freeing attacks: improve your cloud performance (at Your Neighbor's Expense). In: Proceedings of 2012 ACM Conference on Computer and Communications Security, Raleigh (2012).
-
(2012)
Proceedings of 2012 ACM Conference on Computer and Communications Security
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
51
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
CCS '03, New York, ACM
-
Wang, X., Reeves, D. S.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS '03, New York, pp. 20-29. ACM (2003).
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
52
-
-
79551568082
-
Explaining packet delays under virtualization
-
Whiteaker, J., Schneider, F., Teixeira, R.: Explaining packet delays under virtualization. SIGCOMM Comput. Commun. Rev. 41: 38-44 (2011).
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, pp. 38-44
-
-
Whiteaker, J.1
Schneider, F.2
Teixeira, R.3
-
53
-
-
85063207021
-
Black-box and gray-box strategies for virtual machine migration
-
Cambridge
-
Wood, T., Shenoy, P., Venkataramani, A., Yousif, M.: Black-box and gray-box strategies for virtual machine migration In: Proceedings of 4th USENIX Conference on Networked Systems Design and Implementation, Cambridge (2007).
-
(2007)
Proceedings of 4th USENIX Conference on Networked Systems Design and Implementation
-
-
Wood, T.1
Shenoy, P.2
Venkataramani, A.3
Yousif, M.4
-
54
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Security (CCSW'11)
-
Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., Schlichting R.: An exploration of L2 cache covert channels in virtualized environments. In: Proceedings of 3rd ACM Workshop on Cloud Computing, Security (CCSW'11) (2011).
-
(2011)
Proceedings of 3rd ACM Workshop on Cloud Computing
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
56
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
Yu, W., Fu, X., Graham, S., Xuan, D., Zhao, W.: DSSS-based flow marking technique for invisible traceback. In: Proceedings of 2007 IEEE Symposium on Security and Privacy (2007).
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
57
-
-
80052008862
-
HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
-
Berkeley
-
Zhang, Y., Juels, A., Oprea, A., Reiter, M. K.: HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis. In: Proceedings of 2011 IEEE Symposium on Security and Privacy, Berkeley (2011).
-
(2011)
Proceedings of 2011 IEEE Symposium on Security and Privacy
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
58
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Raleigh
-
Zhang, Y., Juels, A., Reiter, M. K., Reiter, M., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of 2012 ACM Conference on Computer and Communications Security, Raleigh (2012).
-
(2012)
Proceedings of 2012 ACM Conference on Computer and Communications Security
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Reiter, M.4
Ristenpart, T.5
|