-
1
-
-
78650158728
-
Determinating timing channels in compute clouds
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi. Determinating timing channels in compute clouds. In ACM Cloud Computing Security Workshop (CCSW), pages 103-108, 2010.
-
(2010)
ACM Cloud Computing Security Workshop (CCSW)
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
2
-
-
84879829456
-
Tight bounds for online vector bin packing
-
Y. Azar, I. Cohen, S. Kamara, and B. Shepherd. Tight bounds for online vector bin packing. In ACM Symposium on Theory of Computing (STOC '13), pages 961-970, 2013.
-
(2013)
ACM Symposium on Theory of Computing (STOC '13)
, pp. 961-970
-
-
Azar, Y.1
Cohen, I.2
Kamara, S.3
Shepherd, B.4
-
3
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 13(1), 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
5
-
-
0001491336
-
Resource constrained scheduling as generalized bin packing
-
Series A
-
M. R Garey, R. L. Graham, D. S. Johnson, and A. Yao. Resource constrained scheduling as generalized bin packing. Journal of Combinatorial Theory, Series A, 21(3):257-298, 1976.
-
(1976)
Journal of Combinatorial Theory
, vol.21
, Issue.3
, pp. 257-298
-
-
Garey, M.R.1
Graham, R.L.2
Johnson, D.S.3
Yao, A.4
-
7
-
-
85073538603
-
System-level protection against cache-based side channel attacks in the cloud
-
T. Kim, M. Peinado, and G. Mainar-Ruiz. System-level protection against cache-based side channel attacks in the cloud. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
8
-
-
84863681404
-
Validating heuristics for virtual machines consolidation
-
Microsoft Research
-
S. Lee, R. Panigrahy, V. Prabhakaran, V. Ramasubramanian, K. Talwar, L. Uyeda, and U. Wieder. Validating heuristics for virtual machines consolidation. Technical Report MSR-TR-2011-9, Microsoft Research, 2011.
-
(2011)
Technical Report MSR-TR-2011-9
-
-
Lee, S.1
Panigrahy, R.2
Prabhakaran, V.3
Ramasubramanian, V.4
Talwar, K.5
Uyeda, L.6
Wieder, U.7
-
11
-
-
84864837138
-
Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
-
R. Martin, J. Demme, and S. Sethumadhavan. Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. ACM SIGARCH Computer Architecture News, 40(3):118-129, 2012.
-
(2012)
ACM SIGARCH Computer Architecture News
, vol.40
, Issue.3
, pp. 118-129
-
-
Martin, R.1
Demme, J.2
Sethumadhavan, S.3
-
12
-
-
20744445610
-
A bound on the deviation probability for sums of non-negative random variables
-
A. Maurer. A bound on the deviation probability for sums of non-negative random variables. Journal of Inequalities in Pure and Applied Mathematics, 4(1):15, 2003.
-
(2003)
Journal of Inequalities in Pure and Applied Mathematics
, vol.4
, Issue.1
, pp. 15
-
-
Maurer, A.1
-
13
-
-
84866547096
-
Heuristics for vector bin packing
-
R. Panigrahy, K. Talwar, L. Uyeda, and U. Wieder. Heuristics for vector bin packing. Technical report, Microsoft Research, 2011.
-
(2011)
Technical Report, Microsoft Research
-
-
Panigrahy, R.1
Talwar, K.2
Uyeda, L.3
Wieder, U.4
-
14
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
H. Raj, R. Nathuji, A. Singh, and P. England. Resource management for isolation enhanced cloud services. In ACM Cloud Computing Security Workshop (CCSW), pages 77-84, 2009.
-
(2009)
ACM Cloud Computing Security Workshop (CCSW)
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
15
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In ACM conference on Computer and communications security (CCS '09), pages 199-212. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
16
-
-
80052143494
-
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring
-
J. Shi, X. Song, H. Chen, and B. Zang. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pages 194-199, 2011.
-
(2011)
IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
, pp. 194-199
-
-
Shi, J.1
Song, X.2
Chen, H.3
Zang, B.4
-
17
-
-
0022012946
-
Amortized efficiency of list update and paging rules
-
D. Sleator and R. Tarjan. Amortized efficiency of list update and paging rules. Communications of the ACM, 28(2):202-208, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.2
, pp. 202-208
-
-
Sleator, D.1
Tarjan, R.2
-
21
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
Z. Wang and R. Lee. New cache designs for thwarting software cache-based side channel attacks. ACM SIGARCH Computer Architecture News, 35(2):494-505, 2007.
-
(2007)
ACM SIGARCH Computer Architecture News
, vol.35
, Issue.2
, pp. 494-505
-
-
Wang, Z.1
Lee, R.2
-
23
-
-
0000930151
-
There is no asymptotic PTAs for two-dimensional vector packing
-
G. Woeginger. There is no asymptotic PTAS for two-dimensional vector packing. Information Processing Letters, 64(6):293-297, 1997.
-
(1997)
Information Processing Letters
, vol.64
, Issue.6
, pp. 293-297
-
-
Woeginger, G.1
-
24
-
-
84869859962
-
Cross-vm side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart. Cross-vm side channels and their use to extract private keys. In ACM Conference on Computer and Communications Security (CCS '12), pages 305-316, 2012.
-
(2012)
ACM Conference on Computer and Communications Security (CCS '12)
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.3
Ristenpart, T.4
|