메뉴 건너뛰기




Volumn , Issue , 2016, Pages 341-352

Hardening OpenStack cloud platforms against compute node compromises

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; HARDENING; SALES; SYSTEMS ENGINEERING; TRUSTED COMPUTING;

EID: 84979653181     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2897845.2897851     Document Type: Conference Paper
Times cited : (19)

References (32)
  • 3
    • 80955157896 scopus 로고    scopus 로고
    • Trusted Platform-as-a-service: A Foundation for Trustworthy Cloud-hosted Applications
    • Brown, A., and Chase, J. S. Trusted Platform-as-a-service: A Foundation for Trustworthy Cloud-hosted Applications. In CCSW (2011).
    • (2011) CCSW
    • Brown, A.1    Chase, J.S.2
  • 8
    • 34547446292 scopus 로고
    • The Confused Deputy: (Or Why Capabilities Might Have Been Invented)
    • Oct
    • Hardy, N. The Confused Deputy: (or Why Capabilities Might Have Been Invented). SIGOPS Oper. Syst. Rev. 22, 4 (Oct. 1988).
    • (1988) SIGOPS Oper. Syst. Rev , vol.22 , pp. 4
    • Hardy, N.1
  • 9
    • 84861175145 scopus 로고    scopus 로고
    • Doubleguard: Detecting Intrusions in Multitier Web Applications
    • Le, M., Stavrou, A., and Kang, B. B. Doubleguard: Detecting Intrusions in Multitier Web Applications. In TDSC (2012).
    • (2012) TDSC
    • Le, M.1    Stavrou, A.2    Kang, B.B.3
  • 10
    • 4143131046 scopus 로고    scopus 로고
    • Meeting Critical Security Objectives with Security-Enhanced Linux
    • Loscocco, P., and Smalley, S. Meeting Critical Security Objectives with Security-Enhanced Linux. In Ottawa Linux symposium (2001).
    • (2001) Ottawa Linux Symposium
    • Loscocco, P.1    Smalley, S.2
  • 11
    • 84979682870 scopus 로고    scopus 로고
    • Online; accessed November 13
    • Luft, M. Analysis of Hypervisor Breakouts, http://www.insinuator.net/2013/05/ analysis-of-hypervisor-breakouts/. Online; accessed November 13, 2014.
    • (2014) Analysis of Hypervisor Breakouts
    • Luft, M.1
  • 12
    • 84979707017 scopus 로고    scopus 로고
    • OpenStack Foundation, Online; accessed November 13
    • OpenStack Foundation. MessageSecurity - OpenStack, https://wiki.openstack.org/wiki/MessageSecurity. Online; accessed November 13, 2014.
    • (2014) MessageSecurity - OpenStack
  • 16
    • 84963560129 scopus 로고    scopus 로고
    • OpenStack Foundation, Online; accessed November 13
    • OpenStack Foundation. OpenStack Networking (neutron), http://docs.openstack.org/icehouse/install-guide/ install/apt/content/basics-networking-neutron.html. Online; accessed November 13, 2014.
    • (2014) OpenStack Networking (Neutron)
  • 17
    • 84921053242 scopus 로고    scopus 로고
    • OpenStack Foundation, Online; accessed November 13
    • OpenStack Foundation. OpenStack Open Source Cloud Computing Software, http://www.openstack.org/. Online; accessed November 13, 2014.
    • (2014) OpenStack Open Source Cloud Computing Software
  • 18
    • 84908646850 scopus 로고    scopus 로고
    • OpenStack Foundation, Online; accessed August 4
    • OpenStack Foundation. OpenStack Security Guide, http://docs.openstack.org/security-guide/ security-guide.pdf. Online; accessed August 4, 2014.
    • (2014) OpenStack Security Guide
  • 19
    • 84979653016 scopus 로고    scopus 로고
    • OpenStack Foundation, Online; accessed November 13
    • OpenStack Foundation. Tempest Testing Project, http://docs.openstack.org/developer/tempest/. Online; accessed November 13, 2014.
    • (2014) Tempest Testing Project
  • 20
    • 74049152260 scopus 로고    scopus 로고
    • Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds
    • Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds. In CCS (2009).
    • (2009) CCS
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 21
    • 84888066817 scopus 로고    scopus 로고
    • Cloud Verifier: Verifiable Auditing Service for IaaS Clouds
    • Schiffman, J., Sun, Y., Vijayakumar, H., and Jaeger, T. Cloud Verifier: Verifiable Auditing Service for IaaS Clouds. In SERVICES (2013).
    • (2013) SERVICES
    • Schiffman, J.1    Sun, Y.2    Vijayakumar, H.3    Jaeger, T.4
  • 22
    • 80053015448 scopus 로고    scopus 로고
    • An Efficient Black-box Technique for Defeating Web Application Attacks
    • Sekar, R. An Efficient Black-box Technique for Defeating Web Application Attacks. In NDSS (2009).
    • (2009) NDSS
    • Sekar, R.1
  • 23
    • 0034829697 scopus 로고    scopus 로고
    • A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
    • Sekar, R., Bendre, M., Dhurjati, D., and Bollineni, P. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In S&P (2001).
    • (2001) S&P
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 24
    • 84908652218 scopus 로고    scopus 로고
    • SELinux Project, Online; accessed November 6
    • SELinux Project. SVirt - SELinux Wiki, http://selinuxproject.org/page/SVirt. Online; accessed November 6, 2014.
    • (2014) SVirt - SELinux Wiki
  • 25
    • 84869761446 scopus 로고    scopus 로고
    • Towards a Richer Model of Cloud App Markets
    • Srivastava, A., and Ganapathy, V. Towards a Richer Model of Cloud App Markets. In CCSW (2012).
    • (2012) CCSW
    • Srivastava, A.1    Ganapathy, V.2
  • 26
    • 84869420073 scopus 로고    scopus 로고
    • Trusted VM Snapshots in Untrusted Cloud Infrastructures
    • Srivastava, A., Raj, H., Giffin, J., and England, P. Trusted VM Snapshots in Untrusted Cloud Infrastructures. In RAID (2012).
    • (2012) RAID
    • Srivastava, A.1    Raj, H.2    Giffin, J.3    England, P.4
  • 27
    • 84937691245 scopus 로고    scopus 로고
    • Inevitable Failure: The Flawed Trust Assumption in the Cloud
    • Sun, Y., Petracca, G., and Jaeger, T. Inevitable Failure: The Flawed Trust Assumption in the Cloud. In CCSW (2014).
    • (2014) CCSW
    • Sun, Y.1    Petracca, G.2    Jaeger, T.3
  • 28
    • 84869441988 scopus 로고    scopus 로고
    • Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense)
    • Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., and Swift, M. M. Resource-freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense). In CCS (2012).
    • (2012) CCS
    • Varadarajan, V.1    Kooburat, T.2    Farley, B.3    Ristenpart, T.4    Swift, M.M.5
  • 29
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attacks on Host-Based Intrusion Detection Systems
    • Wagner, D., and Soto, P. Mimicry Attacks on Host-Based Intrusion Detection Systems. In CCS (2002).
    • (2002) CCS
    • Wagner, D.1    Soto, P.2
  • 30
    • 84979682895 scopus 로고    scopus 로고
    • Online; accessed May 13
    • Yun Mao. Understanding nova-conductor in OpenStack Nova, http://cloudystuffhappens.blogspot. com/2013/04/understanding-nova-conductor-in.html. Online; accessed May 13, 2015.
    • (2015) Understanding Nova-conductor in OpenStack Nova
    • Mao, Y.1
  • 31
    • 80052008862 scopus 로고    scopus 로고
    • HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
    • Zhang, Y., Juels, A., Oprea, A., and Reiter, M. K. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. In S&P (2011).
    • (2011) S&P
    • Zhang, Y.1    Juels, A.2    Oprea, A.3    Reiter, M.K.4
  • 32
    • 84869859962 scopus 로고    scopus 로고
    • Cross-VM Side Channels and Their Use to Extract Private Keys
    • Zhang, Y., Juels, A., Reiter, M. K., and Ristenpart, T. Cross-VM Side Channels and Their Use to Extract Private Keys. In CCS (2012).
    • (2012) CCS
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.