-
1
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S.: "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009), 2009, pp. 199-212
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
2
-
-
84869859962
-
Cross-VM Side channels and their use to extract private keys
-
Zhang, Y., Juels, A., Reiter, M., and Ristenpart, T.: "Cross-VM Side Channels and Their Use to Extract Private Keys," Proc. 2012 ACM Conference on Computer and Communications Security-CCS '12, 2012, pp. 305-316
-
(2012)
Proc. 2012 ACM Conference on Computer and Communications Security-CCS '12
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.3
Ristenpart, T.4
-
3
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
Okamura, K., Okamura, K., and Oyama, Y.: "Load-based Covert Channels between Xen Virtual Machines," Proc. 2010 ACM Symposium on Applied Computing-SAC '10, 2010, pp. 173-180
-
(2010)
Proc. 2010 ACM Symposium on Applied Computing-SAC '10
, pp. 173-180
-
-
Okamura, K.1
Okamura, K.2
Oyama, Y.3
-
4
-
-
84856079448
-
Energy consumption side-channel attack at virtual machines in a cloud
-
Hlavacs, H., Treutner, T., Gelas, J.-P., Lefevre, L., and Orgerie, A.-C.: "Energy Consumption Side-Channel Attack at Virtual Machines in a Cloud," Proc. 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011, pp. 605-612
-
(2011)
Proc. 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
, pp. 605-612
-
-
Hlavacs, H.1
Treutner, T.2
Gelas, J.-P.3
Lefevre, L.4
Orgerie, A.-C.5
-
5
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in xen virtual machines
-
Wu, J., Ding, L., Wang, Y., and Han, W.: "Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines," Proc. 2011 IEEE 4th International Conference on Cloud Computing, 2011, pp. 283-291
-
(2011)
Proc. 2011 IEEE 4th International Conference on Cloud Computing
, pp. 283-291
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
Han, W.4
-
6
-
-
80955157902
-
An exploration of l2 cache covert channels in virtualized environments
-
Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., and Schlichting, R.: "An Exploration of L2 Cache Covert Channels in Virtualized Environments," Proc. 3rd ACM Workshop on Cloud Computing Security-CCSW '11, 2011, pp. 29-39
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security-CCSW '11
, pp. 29-39
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
7
-
-
84873142358
-
Scheduling with privacy constraints
-
Kadloor, S., Kadloor, S., Kiyavash, N., and Venkitasubramaniam, P.: "Scheduling with Privacy Constraints," Proc. 2012 IEEE Information Theory Workshop, 2012, pp. 40-44
-
(2012)
Proc. 2012 IEEE Information Theory Workshop
, pp. 40-44
-
-
Kadloor, S.1
Kadloor, S.2
Kiyavash, N.3
Venkitasubramaniam, P.4
-
8
-
-
84873564009
-
Constructing the on/off covert channel on xen
-
Xia, Y., Yetian, X., Xiaochao, Z., Lihong, Y., Li, P., and Jianhua, L.: "Constructing the On/Off Covert Channel on Xen," Proc. 2012 Eighth International Conference on Computational Intelligence and Security, 2012, pp. 568-572
-
(2012)
Proc. 2012 Eighth International Conference on Computational Intelligence and Security
, pp. 568-572
-
-
Xia, Y.1
Yetian, X.2
Xiaochao, Z.3
Lihong, Y.4
Li, P.5
Jianhua, L.6
-
9
-
-
78650158728
-
Determinating timing channels in compute clouds
-
Aviram, A., Hu, S., Ford, B., and Gummadi, R.: "Determinating Timing Channels in Compute Clouds," Proc. 2010 ACM Workshop on Cloud Computing Security Workshop-CCSW '10, 2010, pp. 103-108
-
(2010)
Proc. 2010 ACM Workshop on Cloud Computing Security Workshop-CCSW '10
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
10
-
-
84858790227
-
Architectural support for secure virtualization under a vulnerable hypervisor
-
Jin, S., Ahn, J., Cha, S., and Huh, J.: "Architectural Support for Secure Virtualization under a Vulnerable Hypervisor," Proc. 44th Annual IEEE/ACM International Symposium on Microarchitecture-MICRO '11, 2011, pp. 272-283
-
(2011)
Proc. 44th Annual IEEE/ACM International Symposium on Microarchitecture-MICRO '11
, pp. 272-283
-
-
Jin, S.1
Ahn, J.2
Cha, S.3
Huh, J.4
-
11
-
-
80052143494
-
Limiting cachebased side-channel in multi-tenant cloud using dynamic page coloring
-
Shi, J., Shi, J., Song, X., Chen, H., and Zang, B.: "Limiting Cachebased Side-channel in Multi-tenant Cloud using Dynamic Page Coloring," Proc. 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), 2011, pp. 194-199
-
(2011)
Proc. 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)
, pp. 194-199
-
-
Shi, J.1
Shi, J.2
Song, X.3
Chen, H.4
Zang, B.5
-
12
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
Szefer, J., Keller, E., Lee, R., and Rexford, J.: "Eliminating the Hypervisor Attack Surface for a More Secure Cloud," Proc. 18th ACM Conference on Computer and Communications Security-CCS '11, 2011, pp. 401-412
-
(2011)
Proc. 18th ACM Conference on Computer and Communications Security-CCS '11
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.3
Rexford, J.4
-
13
-
-
80955143535
-
Eliminating fine grained timers in xen
-
Vattikonda, B., Das, S., and Shacham, H.: "Eliminating Fine Grained Timers in Xen," Proc. 3rd ACM Workshop on Cloud Computing Security Workshop-CCSW '11, 2011, pp. 41-46
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop-CCSW '11
, pp. 41-46
-
-
Vattikonda, B.1
Das, S.2
Shacham, H.3
-
14
-
-
84866768367
-
XenPump: A new method to mitigate timing channel in cloud computing
-
Wu, J., Ding, L., Lin, Y., Min Allah, N., and Wang, Y.: "XenPump: A New Method to Mitigate Timing Channel in Cloud Computing," Proc. 2012 IEEE Fifth International Conference on Cloud Computing, 2012, pp. 678-685
-
(2012)
Proc. 2012 IEEE Fifth International Conference on Cloud Computing
, pp. 678-685
-
-
Wu, J.1
Ding, L.2
Lin, Y.3
Min Allah, N.4
Wang, Y.5
-
15
-
-
84893401667
-
Security games for virtual machine allocation in cloud computing
-
Fort Worth, TX, USA
-
Han, Y., Alpcan, T., Chan, J., and Leckie, C.: "Security Games for Virtual Machine Allocation in Cloud Computing," Proc. The fourth Conference on Decision and Game Theory for Security (GameSec 2013), pp. 99-118, Fort Worth, TX, USA
-
Proc. The Fourth Conference on Decision and Game Theory for Security (GameSec 2013)
, pp. 99-118
-
-
Han, Y.1
Alpcan, T.2
Chan, J.3
Leckie, C.4
-
16
-
-
84907001787
-
-
CloudSim, http://www.cloudbus.org/cloudsim/
-
-
-
-
17
-
-
78650777991
-
CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
-
Calheiros, R., Ranjan, R., Beloglazov, A., De Rose, C.A.F., and Buyya, R.: "CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms," Software, Practice and Experience, 2011, 41, (1), pp. 23-50
-
(2011)
Software, Practice and Experience
, vol.41
, Issue.1
, pp. 23-50
-
-
Calheiros, R.1
Ranjan, R.2
Beloglazov, A.3
De Rose, C.A.F.4
Buyya, R.5
-
18
-
-
84907001786
-
-
OpenStack, http://www.openstack.org/
-
-
-
-
19
-
-
84907001785
-
-
Eucalyptus, http://www.eucalyptus.com/
-
-
-
-
20
-
-
84907001784
-
-
OpenNebula, http://opennebula.org/
-
-
-
-
21
-
-
84907001783
-
-
CloudStack, http://cloudstack.apache.org/
-
-
-
-
22
-
-
84888065117
-
Analysing virtual machine usage in cloud computing
-
June 28-July 3
-
Han, Y., Chan, J., and Leckie, C.: "Analysing Virtual Machine Usage in Cloud Computing," Proc. 2013 IEEE Ninth World Congress on Services (SERVICES), June 28-July 3 2013, pp. 370-377
-
(2013)
Proc. 2013 IEEE Ninth World Congress on Services (SERVICES)
, pp. 370-377
-
-
Han, Y.1
Chan, J.2
Leckie, C.3
|