메뉴 건너뛰기




Volumn , Issue , 2015, Pages 913-928

A placement vulnerability study in multi-tenant public clouds

Author keywords

Cloud security; Co location detection; Multi tenancy

Indexed keywords

ECONOMICS; INFRASTRUCTURE AS A SERVICE (IAAS); LOCATION; MAPS; VIRTUAL MACHINE; WINDOWS OPERATING SYSTEM;

EID: 84968932741     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (158)

References (39)
  • 1
    • 85076300394 scopus 로고    scopus 로고
    • Amazon ec2 instance store. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html.
    • Amazon Ec2 Instance Store
  • 3
    • 85076294949 scopus 로고    scopus 로고
    • Apache libcloud. http://libcloud.apache.org/.
  • 5
    • 84957593956 scopus 로고    scopus 로고
    • re:invent slide 9-10
    • Aws innovation at scale, re:invent 2014, slide 9-10. http://www.slideshare.net/AmazonWebServices/spot301-aws- innovation- at- scale- aws- reinvent- 2014.
    • (2014) Aws Innovation at Scale
  • 12
    • 85076304871 scopus 로고    scopus 로고
    • Olio workload. https://cwiki.apache.org/confluence/display/OLIO/The+Workload.
    • Olio Workload
  • 13
    • 85076288985 scopus 로고    scopus 로고
    • Rightscale. http://www.rightscale.com.
    • Rightscale
  • 15
    • 84864720397 scopus 로고    scopus 로고
    • Windows azure. http://www.windowsazure.com/.
    • Windows Azure
  • 16
    • 84870631425 scopus 로고    scopus 로고
    • Amazon ec2 pricing, 2015. http://aws.amazon.com/ec2/pricing/.
    • (2015) Amazon Ec2 Pricing
  • 23
    • 84954186634 scopus 로고    scopus 로고
    • Security games for virtual machine allocation in cloud computing
    • Springer International Publishing
    • Y. Han, T. Alpcan, J. Chan, and C. Leckie. Security games for virtual machine allocation in cloud computing. In Decision and Game Theory for Security. Springer International Publishing, 2013.
    • (2013) Decision and Game Theory for Security
    • Han, Y.1    Alpcan, T.2    Chan, J.3    Leckie, C.4
  • 32
    • 84945979212 scopus 로고    scopus 로고
    • Whispers in the hyper-space: High-speed covert channel attacks in the cloud
    • Z. Wu, Z. Xu, and H. Wang. Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In USENIX Security symposium, pages 159–173, 2012.
    • (2012) USENIX Security Symposium , pp. 159-173
    • Wu, Z.1    Xu, Z.2    Wang, H.3
  • 34
    • 85076268999 scopus 로고    scopus 로고
    • A measurement study on co-residence threat inside the cloud
    • Z. Xu, H. Wang, and Z. Wu. A measurement study on co-residence threat inside the cloud. In USENIX Security Symposium, 2015.
    • (2015) USENIX Security Symposium
    • Xu, Z.1    Wang, H.2    Wu, Z.3
  • 35
    • 85076305746 scopus 로고    scopus 로고
    • Flush+reload: A high resolution, low noise, L3 cache side-channel attack
    • USENIX Association
    • Y. Yarom and K. Falkner. Flush+reload: A high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium, pages 719–732. USENIX Association, 2014.
    • (2014) 23rd USENIX Security Symposium , pp. 719-732
    • Yarom, Y.1    Falkner, K.2
  • 39
    • 84881168028 scopus 로고    scopus 로고
    • Scheduler vulnerabilities and attacks in cloud computing
    • abs/1103.0759
    • F. Zhou, M. Goel, P. Desnoyers, and R. Sundaram. Scheduler vulnerabilities and attacks in cloud computing. CoRR, abs/1103.0759, 2011.
    • (2011) CoRR
    • Zhou, F.1    Goel, M.2    Desnoyers, P.3    Sundaram, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.