-
2
-
-
74049152260
-
Hey, You, Get off of my Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shachem, S. Savage. "Hey, You, Get Off of my Cloud: Exploring Information Leakage in Third-Party Compute Clouds", In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), pages 199-212, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shachem, H.3
Savage, S.4
-
4
-
-
84869859962
-
Cross-VM side-channels and Their Use to Extract Private Keys
-
Y. Zhang, M. Reiter, A. Juels, T. Ristenpart. "Cross-VM side-channels and Their Use to Extract Private Keys", In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), pages 305-316, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS)
, pp. 305-316
-
-
Zhang, Y.1
Reiter, M.2
Juels, A.3
Ristenpart, T.4
-
6
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
B. Lampson. "A Note on the Confinement Problem", In Communications of the ACM, Volume 16, Issue 10, pages 613-615, Oct 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
7
-
-
67349189758
-
Cryptanalysis of des implemented on computers with cache
-
Springer LNCS
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri. "Cryptanalysis of DES Implemented on Computers with Cache", In Proceedings of Cryptographic Hardware and Embedded Systems (CHES), Springer LNCS, 2003.
-
(2003)
Proceedings of Cryptographic Hardware and Embedded Systems (CHES)
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
-
8
-
-
1942441379
-
Defending against cache-based side-channel attacks
-
March
-
D. Page. "Defending Against Cache-Based Side-Channel Attacks", In Information Security Technical Report, Volume 8, Issue 1, pages 30-44, March 2003
-
(2003)
Information Security Technical Report
, vol.8
, Issue.1
, pp. 30-44
-
-
Page, D.1
-
10
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang , X. Wang, K. Zhang. "Side-Channel Leaks in Web Applications: A Reality Today, A Challenge Tomorrow", In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP), pages 191-206, 2010.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP)
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
11
-
-
80455179720
-
RT-Xen: Towards real-time hypervisor scheduling in xen
-
S. Xi, J. Wilson, C. Lu, C. Gill. "RT-Xen: Towards Real-time Hypervisor Scheduling in Xen", In Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT), pages 39-48, 2011.
-
(2011)
Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT)
, pp. 39-48
-
-
Xi, S.1
Wilson, J.2
Lu, C.3
Gill, C.4
-
12
-
-
84897717110
-
Tackling the management challenges of server consolidation on multi-core systems
-
Presented at Retreived from on Nov 7th 2012
-
H. Lv. "Tackling the Management Challenges of Server Consolidation on Multi-Core Systems", Presented at XenSummit August 2011. Retreived from http://www.xen.org/xensummit/xensummit-summer-2011.html on Nov 7th 2012.
-
(2011)
XenSummit August
-
-
Lv, H.1
-
14
-
-
84897734809
-
-
Amazon Web Services
-
Amazon Web Services. http://aws.amazon.com/.
-
-
-
-
15
-
-
84897699471
-
-
Xen
-
Xen. http://www.xen.org/.
-
-
-
-
17
-
-
84897681648
-
-
Xen Credit Scheduler
-
Xen Credit Scheduler. http://wiki.xensource.com/xenwiki/CreditScheduler
-
-
-
|