-
2
-
-
84886549177
-
Client-controlled Cryptography-as-a-service in the Cloud
-
Bleikertz, S., Bugiel, S., Ideler, H., Nürnberger, S., and Sadeghi, A.-R. Client-controlled Cryptography-as-a-service in the Cloud. In ACNS (2013).
-
(2013)
ACNS
-
-
Bleikertz, S.1
Bugiel, S.2
Ideler, H.3
Nürnberger, S.4
Sadeghi, A.-R.5
-
3
-
-
80955157896
-
Trusted Platform-as-a-service: A Foundation for Trustworthy Cloud-hosted Applications
-
Brown, A., and Chase, J. S. Trusted Platform-as-a-service: A Foundation for Trustworthy Cloud-hosted Applications. In CCSW (2011).
-
(2011)
CCSW
-
-
Brown, A.1
Chase, J.S.2
-
4
-
-
84869447330
-
Self-service Cloud Computing
-
Butt, S., Lagar-Cavilla, H. A., Srivastava, A., and Ganapathy, V. Self-service Cloud Computing. In CCS (2012).
-
(2012)
CCS
-
-
Butt, S.1
Lagar-Cavilla, H.A.2
Srivastava, A.3
Ganapathy, V.4
-
5
-
-
84892405290
-
M. More for Your Money: Exploiting Performance Heterogeneity in Public Clouds
-
Farley, B., Juels, A., Varadarajan, V., Ristenpart, T., Bowers, K. D., and Swift, M. M. More for Your Money: Exploiting Performance Heterogeneity in Public Clouds. In SoCC (2012).
-
(2012)
SoCC
-
-
Farley, B.1
Juels, A.2
Varadarajan, V.3
Ristenpart, T.4
Bowers, K.D.5
Swift, M.6
-
7
-
-
36448960621
-
Environment-Sensitive Intrusion Detection
-
Giffin, J. T., Dagon, D., Jha, S., Lee, W., and Miller, B. P. Environment-Sensitive Intrusion Detection. In RAID (2006).
-
(2006)
RAID
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
8
-
-
34547446292
-
The Confused Deputy: (Or Why Capabilities Might Have Been Invented)
-
Oct
-
Hardy, N. The Confused Deputy: (or Why Capabilities Might Have Been Invented). SIGOPS Oper. Syst. Rev. 22, 4 (Oct. 1988).
-
(1988)
SIGOPS Oper. Syst. Rev
, vol.22
, pp. 4
-
-
Hardy, N.1
-
9
-
-
84861175145
-
Doubleguard: Detecting Intrusions in Multitier Web Applications
-
Le, M., Stavrou, A., and Kang, B. B. Doubleguard: Detecting Intrusions in Multitier Web Applications. In TDSC (2012).
-
(2012)
TDSC
-
-
Le, M.1
Stavrou, A.2
Kang, B.B.3
-
10
-
-
4143131046
-
Meeting Critical Security Objectives with Security-Enhanced Linux
-
Loscocco, P., and Smalley, S. Meeting Critical Security Objectives with Security-Enhanced Linux. In Ottawa Linux symposium (2001).
-
(2001)
Ottawa Linux Symposium
-
-
Loscocco, P.1
Smalley, S.2
-
11
-
-
84979682870
-
-
Online; accessed November 13
-
Luft, M. Analysis of Hypervisor Breakouts, http://www.insinuator.net/2013/05/ analysis-of-hypervisor-breakouts/. Online; accessed November 13, 2014.
-
(2014)
Analysis of Hypervisor Breakouts
-
-
Luft, M.1
-
12
-
-
84979707017
-
-
OpenStack Foundation, Online; accessed November 13
-
OpenStack Foundation. MessageSecurity - OpenStack, https://wiki.openstack.org/wiki/MessageSecurity. Online; accessed November 13, 2014.
-
(2014)
MessageSecurity - OpenStack
-
-
-
16
-
-
84963560129
-
-
OpenStack Foundation, Online; accessed November 13
-
OpenStack Foundation. OpenStack Networking (neutron), http://docs.openstack.org/icehouse/install-guide/ install/apt/content/basics-networking-neutron.html. Online; accessed November 13, 2014.
-
(2014)
OpenStack Networking (Neutron)
-
-
-
17
-
-
84921053242
-
-
OpenStack Foundation, Online; accessed November 13
-
OpenStack Foundation. OpenStack Open Source Cloud Computing Software, http://www.openstack.org/. Online; accessed November 13, 2014.
-
(2014)
OpenStack Open Source Cloud Computing Software
-
-
-
18
-
-
84908646850
-
-
OpenStack Foundation, Online; accessed August 4
-
OpenStack Foundation. OpenStack Security Guide, http://docs.openstack.org/security-guide/ security-guide.pdf. Online; accessed August 4, 2014.
-
(2014)
OpenStack Security Guide
-
-
-
19
-
-
84979653016
-
-
OpenStack Foundation, Online; accessed November 13
-
OpenStack Foundation. Tempest Testing Project, http://docs.openstack.org/developer/tempest/. Online; accessed November 13, 2014.
-
(2014)
Tempest Testing Project
-
-
-
20
-
-
74049152260
-
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds
-
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds. In CCS (2009).
-
(2009)
CCS
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
21
-
-
84888066817
-
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds
-
Schiffman, J., Sun, Y., Vijayakumar, H., and Jaeger, T. Cloud Verifier: Verifiable Auditing Service for IaaS Clouds. In SERVICES (2013).
-
(2013)
SERVICES
-
-
Schiffman, J.1
Sun, Y.2
Vijayakumar, H.3
Jaeger, T.4
-
22
-
-
80053015448
-
An Efficient Black-box Technique for Defeating Web Application Attacks
-
Sekar, R. An Efficient Black-box Technique for Defeating Web Application Attacks. In NDSS (2009).
-
(2009)
NDSS
-
-
Sekar, R.1
-
23
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
Sekar, R., Bendre, M., Dhurjati, D., and Bollineni, P. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In S&P (2001).
-
(2001)
S&P
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
24
-
-
84908652218
-
-
SELinux Project, Online; accessed November 6
-
SELinux Project. SVirt - SELinux Wiki, http://selinuxproject.org/page/SVirt. Online; accessed November 6, 2014.
-
(2014)
SVirt - SELinux Wiki
-
-
-
25
-
-
84869761446
-
Towards a Richer Model of Cloud App Markets
-
Srivastava, A., and Ganapathy, V. Towards a Richer Model of Cloud App Markets. In CCSW (2012).
-
(2012)
CCSW
-
-
Srivastava, A.1
Ganapathy, V.2
-
26
-
-
84869420073
-
Trusted VM Snapshots in Untrusted Cloud Infrastructures
-
Srivastava, A., Raj, H., Giffin, J., and England, P. Trusted VM Snapshots in Untrusted Cloud Infrastructures. In RAID (2012).
-
(2012)
RAID
-
-
Srivastava, A.1
Raj, H.2
Giffin, J.3
England, P.4
-
27
-
-
84937691245
-
Inevitable Failure: The Flawed Trust Assumption in the Cloud
-
Sun, Y., Petracca, G., and Jaeger, T. Inevitable Failure: The Flawed Trust Assumption in the Cloud. In CCSW (2014).
-
(2014)
CCSW
-
-
Sun, Y.1
Petracca, G.2
Jaeger, T.3
-
28
-
-
84869441988
-
Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense)
-
Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., and Swift, M. M. Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense). In CCS (2012).
-
(2012)
CCS
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
29
-
-
0038011184
-
Mimicry Attacks on Host-Based Intrusion Detection Systems
-
Wagner, D., and Soto, P. Mimicry Attacks on Host-Based Intrusion Detection Systems. In CCS (2002).
-
(2002)
CCS
-
-
Wagner, D.1
Soto, P.2
-
30
-
-
84979682895
-
-
Online; accessed May 13
-
Yun Mao. Understanding nova-conductor in OpenStack Nova, http://cloudystuffhappens.blogspot. com/2013/04/understanding-nova-conductor-in.html. Online; accessed May 13, 2015.
-
(2015)
Understanding Nova-conductor in OpenStack Nova
-
-
Mao, Y.1
-
31
-
-
80052008862
-
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
-
Zhang, Y., Juels, A., Oprea, A., and Reiter, M. K. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. In S&P (2011).
-
(2011)
S&P
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
32
-
-
84869859962
-
Cross-VM Side Channels and Their Use to Extract Private Keys
-
Zhang, Y., Juels, A., Reiter, M. K., and Ristenpart, T. Cross-VM Side Channels and Their Use to Extract Private Keys. In CCS (2012).
-
(2012)
CCS
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|