-
1
-
-
85076300394
-
-
Amazon ec2 instance store. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html.
-
Amazon Ec2 Instance Store
-
-
-
3
-
-
85076294949
-
-
Apache libcloud. http://libcloud.apache.org/.
-
-
-
-
5
-
-
84957593956
-
-
re:invent slide 9-10
-
Aws innovation at scale, re:invent 2014, slide 9-10. http://www.slideshare.net/AmazonWebServices/spot301-aws- innovation- at- scale- aws- reinvent- 2014.
-
(2014)
Aws Innovation at Scale
-
-
-
12
-
-
85076304871
-
-
Olio workload. https://cwiki.apache.org/confluence/display/OLIO/The+Workload.
-
Olio Workload
-
-
-
13
-
-
85076288985
-
-
Rightscale. http://www.rightscale.com.
-
Rightscale
-
-
-
15
-
-
84864720397
-
-
Windows azure. http://www.windowsazure.com/.
-
Windows Azure
-
-
-
16
-
-
84870631425
-
-
Amazon ec2 pricing, 2015. http://aws.amazon.com/ec2/pricing/.
-
(2015)
Amazon Ec2 Pricing
-
-
-
18
-
-
84937709982
-
Co-location-resistant clouds
-
In
-
Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepard. Co-location-resistant clouds. In In Proceedings of the ACM Workshop on Cloud Computing Security, pages 9–20, 2014.
-
(2014)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 9-20
-
-
Azar, Y.1
Kamara, S.2
Menache, I.3
Raykova, M.4
Shepard, B.5
-
19
-
-
84869782980
-
Detecting co-residency with active traffic analysis techniques
-
A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler. Detecting co-residency with active traffic analysis techniques. In Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, pages 1–12. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop
, pp. 1-12
-
-
Bates, A.1
Mood, B.2
Pletcher, J.3
Pruse, H.4
Valafar, M.5
Butler, K.6
-
21
-
-
85081774739
-
More for your money: Exploiting performance heterogeneity in public clouds
-
B. Farley, A. Juels, V. Varadarajan, T. Ristenpart, K. D. Bowers, and M. M. Swift. More for your money: Exploiting performance heterogeneity in public clouds. In Proceedings of the Third ACM Symposium on Cloud Computing. ACM, 2012.
-
(2012)
Proceedings of the Third ACM Symposium on Cloud Computing
-
-
Farley, B.1
Juels, A.2
Varadarajan, V.3
Ristenpart, T.4
Bowers, K.D.5
Swift, M.M.6
-
22
-
-
84858791438
-
Clearing the clouds: A study of emerging scale-out workloads on modern hardware
-
M. Ferdman, A. Adileh, O. Kocberber, S. Volos, M. Alisafaee, D. Jevdjic, C. Kaynak, A. D. Popescu, A. Ailamaki, and B. Falsafi. Clearing the clouds: a study of emerging scale-out workloads on modern hardware. In Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems. ACM, 2012.
-
(2012)
Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Ferdman, M.1
Adileh, A.2
Kocberber, O.3
Volos, S.4
Alisafaee, M.5
Jevdjic, D.6
Kaynak, C.7
Popescu, A.D.8
Ailamaki, A.9
Falsafi, B.10
-
23
-
-
84954186634
-
Security games for virtual machine allocation in cloud computing
-
Springer International Publishing
-
Y. Han, T. Alpcan, J. Chan, and C. Leckie. Security games for virtual machine allocation in cloud computing. In Decision and Game Theory for Security. Springer International Publishing, 2013.
-
(2013)
Decision and Game Theory for Security
-
-
Han, Y.1
Alpcan, T.2
Chan, J.3
Leckie, C.4
-
25
-
-
84889069721
-
Cloudoscopy: Services discovery and topology mapping
-
A. Herzberg, H. Shulman, J. Ullrich, and E. Weippl. Cloudoscopy: Services discovery and topology mapping. In 2013 ACM Workshop on Cloud Computing Security Workshop, pages 113–122, 2013.
-
(2013)
2013 ACM Workshop on Cloud Computing Security Workshop
, pp. 113-122
-
-
Herzberg, A.1
Shulman, H.2
Ullrich, J.3
Weippl, E.4
-
27
-
-
27544460278
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K. Claffy. Remote physical device fingerprinting. In Security and Privacy, 2005 IEEE Symposium on, pages 211–225. IEEE, 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
29
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199–212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
30
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor’s expense)
-
V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift. Resource-freeing attacks: Improve your cloud performance (at your neighbor’s expense). In Proceedings of the 2012 ACM conference on Computer and communications security, pages 281–292. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
31
-
-
84910110465
-
WhOWAs: A platform for measuring web deployments on IaaS clouds
-
L. Wang, A. Nappa, J. Caballero, T. Ristenpart, and A. Akella. Whowas: A platform for measuring web deployments on IaaS clouds. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 101–114. ACM, 2014.
-
(2014)
Proceedings of the 2014 Conference on Internet Measurement Conference
, pp. 101-114
-
-
Wang, L.1
Nappa, A.2
Caballero, J.3
Ristenpart, T.4
Akella, A.5
-
32
-
-
84945979212
-
Whispers in the hyper-space: High-speed covert channel attacks in the cloud
-
Z. Wu, Z. Xu, and H. Wang. Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In USENIX Security symposium, pages 159–173, 2012.
-
(2012)
USENIX Security Symposium
, pp. 159-173
-
-
Wu, Z.1
Xu, Z.2
Wang, H.3
-
33
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting. An exploration of L2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 29–40. ACM, 2011.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
34
-
-
85076268999
-
A measurement study on co-residence threat inside the cloud
-
Z. Xu, H. Wang, and Z. Wu. A measurement study on co-residence threat inside the cloud. In USENIX Security Symposium, 2015.
-
(2015)
USENIX Security Symposium
-
-
Xu, Z.1
Wang, H.2
Wu, Z.3
-
35
-
-
85076305746
-
Flush+reload: A high resolution, low noise, L3 cache side-channel attack
-
USENIX Association
-
Y. Yarom and K. Falkner. Flush+reload: A high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium, pages 719–732. USENIX Association, 2014.
-
(2014)
23rd USENIX Security Symposium
, pp. 719-732
-
-
Yarom, Y.1
Falkner, K.2
-
36
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
IEEE Computer Society
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, pages 313–328. IEEE Computer Society, 2011.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
37
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 305–316. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
38
-
-
84910683194
-
Cross-tenant side-channel attacks in PaaS clouds
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-tenant side-channel attacks in PaaS clouds. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 990–1003. ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 990-1003
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
39
-
-
84881168028
-
Scheduler vulnerabilities and attacks in cloud computing
-
abs/1103.0759
-
F. Zhou, M. Goel, P. Desnoyers, and R. Sundaram. Scheduler vulnerabilities and attacks in cloud computing. CoRR, abs/1103.0759, 2011.
-
(2011)
CoRR
-
-
Zhou, F.1
Goel, M.2
Desnoyers, P.3
Sundaram, R.4
|