-
2
-
-
80755168339
-
Amazonia: When elasticity snaps back
-
S. Bugiel, S. Nürnberger, T. Pöppelmann, A.-R. Sadeghi, and T. Schneider. AmazonIA: when elasticity snaps back. In Proceedings of the 18th ACM conference on Computer and communications security (CCS’11), pages 389–400, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS’11)
, pp. 389-400
-
-
Bugiel, S.1
Nürnberger, S.2
Pöppelmann, T.3
Sadeghi, A.-R.4
Schneider, T.5
-
4
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th conference on USENIX Security Symposium, pages 63–78, 1998.
-
(1998)
Proceedings of the 7th Conference on USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
5
-
-
0003969633
-
-
Department of Defense. Technical Report 5200.28-STD, U.S. Department of Defense
-
Department of Defense. TCSEC: Trusted computer system evaluation criteria. Technical Report 5200.28-STD, U.S. Department of Defense, 1985.
-
(1985)
TCSEC: Trusted Computer System Evaluation Criteria
-
-
-
11
-
-
64949105813
-
Hardware-software integrated approaches to defend against software cache-based side channel attacks
-
J. Kong, O. Aciicmez, J.-P. Seifert, and H. Zhou. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In Proceedings of the IEEE 15th International Symposium on High Performance Computer Architecture (HPCA’09), pages 393–404, 2009.
-
(2009)
Proceedings of the IEEE 15th International Symposium on High Performance Computer Architecture (HPCA’09)
, pp. 393-404
-
-
Kong, J.1
Aciicmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
12
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16:613–615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.W.1
-
15
-
-
23944463649
-
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
-
G. L. Orgill, G. W. Romney, M. G. Bailey, and P. M. Orgill. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In Proceedings of the 5th conference on Information technology education (CITC5’04), pages 177–181, 2004.
-
(2004)
Proceedings of the 5th Conference on Information Technology Education (CITC5’04)
, pp. 177-181
-
-
Orgill, G.L.1
Romney, G.W.2
Bailey, M.G.3
Orgill, P.M.4
-
18
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (CCS’09), pages 199–212, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
19
-
-
0012054514
-
Covert channels in the TCP/IP protocol suite
-
C. H. Rowland. Covert channels in the TCP/IP protocol suite. First Monday, 2, 1997.
-
(1997)
First Monday
, vol.2
-
-
Rowland, C.H.1
-
26
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing security of virtual machine images in a cloud environment. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW’09), pages 91–96, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW’09)
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
29
-
-
84874282652
-
-
XenSource. Xen credit scheduler. http://wiki.xensource.com/xenwiki/CreditScheduler.
-
Xen Credit Scheduler
-
-
-
30
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting. An exploration of L2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW’11), pages 29–40, 2011.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop (CCSW’11)
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
31
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (S&P’11), pages 313–328, 2011.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy (S&P’11)
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|