-
1
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
2
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart, "Cross-VM side channels and their use to extract private keys," in Proc. 19th ACM Conf. Comput. Commun. Security, 2012, pp. 305-316.
-
(2012)
Proc. 19th ACM Conf. Comput. Commun. Security
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.3
Ristenpart, T.4
-
3
-
-
80955143535
-
Eliminating fine grained timers in xen
-
B. Vattikonda, S. Das, and H. Shacham, "Eliminating fine grained timers in xen," in Proc. 3rd ACM Workshop Cloud Comput. Security Workshop, 2011, pp. 41-46.
-
(2011)
Proc. 3rd ACM Workshop Cloud Comput. Security Workshop
, pp. 41-46
-
-
Vattikonda, B.1
Das, S.2
Shacham, H.3
-
4
-
-
84866768367
-
XenPump: A new method to mitigate timing channel in cloud computing
-
J. Wu, L. Ding, Y. Lin, N. Min Allah, and Y. Wang, "XenPump: A new method to mitigate timing channel in cloud computing," in Proc. 5th IEEE Int. Conf. Cloud Comput., 2012, pp. 678-685.
-
(2012)
Proc. 5th IEEE Int. Conf. Cloud Comput.
, pp. 678-685
-
-
Wu, J.1
Ding, L.2
Lin, Y.3
Min Allah, N.4
Wang, Y.5
-
5
-
-
78650158728
-
Determinating timing channels in compute clouds
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds," in Proc. ACM Workshop Cloud Comput. Security Workshop, 2010, pp. 103-108.
-
(2010)
Proc. ACM Workshop Cloud Comput. Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
6
-
-
80052143494
-
Limiting Cachebased side-channel in multi-tenant cloud using dynamic page coloring
-
J. Shi, J. Shi, X. Song, H. Chen, and B. Zang, "Limiting Cachebased side-channel in multi-tenant cloud using dynamic page coloring," in Proc. 41st Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw. Workshops, 2011, pp. 194-199.
-
(2011)
Proc. 41st Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw. Workshops
, pp. 194-199
-
-
Shi, J.1
Shi, J.2
Song, X.3
Chen, H.4
Zang, B.5
-
7
-
-
84907000617
-
Virtual machine allocation policies against co-resident attacks in cloud computing
-
Y. Han, J. Chan, T. Alpcan, and C. Leckie, "Virtual machine allocation policies against co-resident attacks in cloud computing," in Proc. IEEE Int. Conf. Commun., 2014, pp. 786-792.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 786-792
-
-
Han, Y.1
Chan, J.2
Alpcan, T.3
Leckie, C.4
-
9
-
-
84901734176
-
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
-
A. Hameed, A. Khoshkbarforoushha, R. Ranjan, P. Jayaraman, J. Kolodziej, P. Balaji, S. Zeadally, Q. Malluhi, N. Tziritas, A. Vishnu, S. Khan, and A. Zomaya, "A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems," Computing, pp. 1-24, 2014, Doi: 10.1007/s00607-014-0407-8.
-
(2014)
Computing
, pp. 1-24
-
-
Hameed, A.1
Khoshkbarforoushha, A.2
Ranjan, R.3
Jayaraman, P.4
Kolodziej, J.5
Balaji, P.6
Zeadally, S.7
Malluhi, Q.8
Tziritas, N.9
Vishnu, A.10
Khan, S.11
Zomaya, A.12
-
10
-
-
80053167650
-
Energy-efficient management of virtual machines in eucalyptus
-
P. Graubner, "Energy-efficient management of virtual machines in eucalyptus," in Proc. 4th IEEE Int. Conf. Cloud Comput., 2011, pp. 243-250.
-
(2011)
Proc. 4th IEEE Int. Conf. Cloud Comput.
, pp. 243-250
-
-
Graubner, P.1
-
11
-
-
80053206280
-
Energy efficient virtual machine allocation in the coud: An analysis of cloud allocation policies
-
R. Jansen and P. R. Brenner, "Energy efficient virtual machine allocation in the coud: An analysis of cloud allocation policies," in Proc. Int. Green Comput. Conf. Workshops, 2011, pp. 1-8.
-
(2011)
Proc. Int. Green Comput. Conf. Workshops
, pp. 1-8
-
-
Jansen, R.1
Brenner, P.R.2
-
12
-
-
83155184560
-
Reducing electricity cost through virtual machine placement in high performance computing clouds
-
K. Le, R. Bianchini, J. Zhang, Y. Jaluria, J. Meng, and T. D. Nguyen, "Reducing electricity cost through virtual machine placement in high performance computing clouds," in Proc. Int. Conf. High Perform. Comput., Netw., Storage Anal., 2011, pp. 1-12.
-
(2011)
Proc. Int. Conf. High Perform. Comput., Netw., Storage Anal.
, pp. 1-12
-
-
Le, K.1
Bianchini, R.2
Zhang, J.3
Jaluria, Y.4
Meng, J.5
Nguyen, T.D.6
-
13
-
-
84857160088
-
Comparing VM-placement algorithms for on-demand clouds
-
K. Mills, J. Filliben, and C. Dabrowski, "Comparing VM-placement algorithms for on-demand clouds," in Proc. 3rd IEEE Int. Conf. Cloud Comput. Technol. Sci., 2011, pp. 91-98.
-
(2011)
Proc. 3rd IEEE Int. Conf. Cloud Comput. Technol. Sci.
, pp. 91-98
-
-
Mills, K.1
Filliben, J.2
Dabrowski, C.3
-
14
-
-
84857370722
-
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
-
A. Beloglazov, J. Abawajy, and R. Buyya, "Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing," Future Gener. Comput. Syst., vol. 28, no. 5, pp. 755-768, 2012.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.5
, pp. 755-768
-
-
Beloglazov, A.1
Abawajy, J.2
Buyya, R.3
-
15
-
-
85027552037
-
-
CloudSim [Online] Available
-
CloudSim [Online]. Available: Http://www.cloudbus.org/cloudsim/, 2009.
-
(2009)
-
-
-
16
-
-
78650777991
-
CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
-
R. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. De Rose, and R. Buyya, "CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Softw., Practice Experience, vol. 41, no. 1, pp. 23-50, 2011.
-
(2011)
Softw., Practice Experience
, vol.41
, Issue.1
, pp. 23-50
-
-
Calheiros, R.1
Ranjan, R.2
Beloglazov, A.3
De Rose, C.A.F.4
Buyya, R.5
-
17
-
-
85027571608
-
-
OpenStack [Online]. Available
-
OpenStack [Online]. Available: Http://www.openstack.org/, 2010.
-
(2010)
-
-
-
18
-
-
80054989565
-
Scheduler vulnerabilities and coordinated attacks in cloud computing
-
F. F. Zhou, M. Goel, P. Desnoyers, and R. Sundaram, "Scheduler vulnerabilities and coordinated attacks in cloud computing," in Proc. 10th IEEE Int. Symp. Netw. Comput. Appl., 2011, pp. 123-130.
-
(2011)
Proc. 10th IEEE Int. Symp. Netw. Comput. Appl.
, pp. 123-130
-
-
Zhou, F.F.1
Goel, M.2
Desnoyers, P.3
Sundaram, R.4
-
19
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)
-
V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. Swift, "Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 281-292.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.5
-
20
-
-
84874283865
-
Understanding the effects of hypervisor i/o scheduling for virtual machine performance interference
-
Z. Yang, Z. Yang, H. Fang, Y. Wu, C. Li, B. Zhao, and H. H. Huang, "Understanding the effects of hypervisor i/o scheduling for virtual machine performance interference," in Proc. 4th IEEE Int. Conf. Cloud Comput. Technol. Sci., 2012, pp. 34-41.
-
(2012)
Proc. 4th IEEE Int. Conf. Cloud Comput. Technol. Sci.
, pp. 34-41
-
-
Yang, Z.1
Yang, Z.2
Fang, H.3
Wu, Y.4
Li, C.5
Zhao, B.6
Huang, H.H.7
-
21
-
-
85027551348
-
-
Amazon Elastic Compute Cloud (EC2) [Online] Available
-
Amazon Elastic Compute Cloud (EC2) [Online]. Available: Http://aws.amazon.com/ec2/, 2006.
-
(2006)
-
-
-
22
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
D. A. Osvik, A. Shamir, and E. Tromer, "Cache attacks and countermeasures: The case of AES," in Proc. Cryptographers' Track RSA Conf. Topics Cryptol., 2006, pp. 1-20.
-
(2006)
Proc. Cryptographers' Track RSA Conf. Topics Cryptol.
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
23
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir, "Efficient cache attacks on AES, and countermeasures," J. Cryptol., vol. 23, no. 1, pp. 37-71, 2010.
-
(2010)
J. Cryptol.
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
24
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
K. Okamura, K. Okamura, and Y. Oyama, "Load-based covert channels between xen virtual machines," in Proc. ACM Symp. Appl. Comput., 2010, pp. 173-180.
-
(2010)
Proc. ACM Symp. Appl. Comput.
, pp. 173-180
-
-
Okamura, K.1
Okamura, K.2
Oyama, Y.3
-
25
-
-
84856079448
-
Energy consumption side-channel attack at virtual machines in a cloud
-
H. Hlavacs, T. Treutner, J.-P. Gelas, L. Lefevre, and A.-C. Orgerie, "Energy consumption side-channel attack at virtual machines in a cloud," in Proc. 9th IEEE Int. Conf. Dependable, Autonomic Secure Comput., 2011, pp. 605-612.
-
(2011)
Proc. 9th IEEE Int. Conf. Dependable, Autonomic Secure Comput.
, pp. 605-612
-
-
Hlavacs, H.1
Treutner, T.2
Gelas, J.-P.3
Lefevre, L.4
Orgerie, A.-C.5
-
26
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in xen virtual machines
-
J. Wu, L. Ding, Y. Wang, and W. Han, "Identification and evaluation of sharing memory covert timing channel in xen virtual machines," in Proc. 4th IEEE Int. Conf. Cloud Comput., 2011, pp. 283-291.
-
(2011)
Proc. 4th IEEE Int. Conf. Cloud Comput.
, pp. 283-291
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
Han, W.4
-
27
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, "An exploration of L2 cache covert channels in virtualized environments," in Proc. 3rd ACM Workshop Cloud Comput. Security, 2011, pp. 29-39.
-
(2011)
Proc. 3rd ACM Workshop Cloud Comput. Security
, pp. 29-39
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
28
-
-
80052008862
-
HomeAlone: Co-residency detection in the cloud via side-channel analysis
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "HomeAlone: Co-residency detection in the cloud via side-channel analysis," in Proc. IEEE Symp. Security Privacy, 2011, pp. 313-328.
-
(2011)
Proc. IEEE Symp. Security Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
30
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
Z. Wang and R. B. Lee, "New cache designs for thwarting software cache-based side channel attacks," in Proc. 34th Annu. Int. Symp. Comput. Archit., 2007, pp. 494-505.
-
(2007)
Proc. 34th Annu. Int. Symp. Comput. Archit.
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
31
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
J. Szefer, E. Keller, R. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud," in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 401-412.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Security
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.3
Rexford, J.4
-
32
-
-
84889019424
-
Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
-
Y. Zhang and M. K. Reiter, "Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud," in Proc. ACMSIGSAC Conf. Comput. Commun. Security, 2013, pp. 827-838.
-
(2013)
Proc. ACMSIGSAC Conf. Comput. Commun. Security
, pp. 827-838
-
-
Zhang, Y.1
Reiter, M.K.2
-
33
-
-
85008938648
-
Scheduler-based defenses against cross-VM side-channels
-
V. Varadarajan, T. Ristenpart, and M. Swift, "Scheduler-based defenses against cross-VM side-channels," in Proc. 23rd USENIX Security Symp., 2014, pp. 687-702.
-
(2014)
Proc. 23rd USENIX Security Symp.
, pp. 687-702
-
-
Varadarajan, V.1
Ristenpart, T.2
Swift, M.3
-
34
-
-
84869782980
-
Detecting co-residency with active traffic analysis techniques
-
A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, "Detecting co-residency with active traffic analysis techniques," in Proc. ACM Workshop Cloud Comput. Security Workshop, 2012, pp. 1-12.
-
(2012)
Proc. ACM Workshop Cloud Comput. Security Workshop
, pp. 1-12
-
-
Bates, A.1
Mood, B.2
Pletcher, J.3
Pruse, H.4
Valafar, M.5
Butler, K.6
-
35
-
-
84877939689
-
Detecting VMs coresidency in cloud: Using cache-based side channel attacks
-
S. Yu, X. Gui, J. Lin, X. Zhang, and J. Wang, "Detecting VMs coresidency in cloud: Using cache-based side channel attacks," Elektronika ir Elektrotechnika, vol. 19, no. 5, pp. 73-78, 2013.
-
(2013)
Elektronika Ir Elektrotechnika
, vol.19
, Issue.5
, pp. 73-78
-
-
Yu, S.1
Gui, X.2
Lin, J.3
Zhang, X.4
Wang, J.5
-
36
-
-
84897039338
-
On detecting co-resident cloud instances using network flow watermarking techniques
-
A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, "On detecting co-resident cloud instances using network flow watermarking techniques," Int. J. Inf. Security, vol. 13, no. 2, pp. 171-189, 2014.
-
(2014)
Int. J. Inf. Security
, vol.13
, Issue.2
, pp. 171-189
-
-
Bates, A.1
Mood, B.2
Pletcher, J.3
Pruse, H.4
Valafar, M.5
Butler, K.6
-
38
-
-
84876748582
-
An approach with two-stage mode to detect cache-based side channel attacks
-
S. Yu, X. Gui, and J. Lin, "An approach with two-stage mode to detect cache-based side channel attacks," in Proc. Int. Conf. Inf. Netw., 2013, pp. 186-191.
-
(2013)
Proc. Int. Conf. Inf. Netw.
, pp. 186-191
-
-
Yu, S.1
Gui, X.2
Lin, J.3
-
39
-
-
84867647101
-
Improving cloud survivability through dependency based virtual machine placement
-
M. Li, Y. Zhang, K. Bai, W. Zhang, M. Yu, and X. He, "Improving cloud survivability through dependency based virtual machine placement," in Proc. Int. Conf. Security Cryptography, 2012, pp. 321-326.
-
(2012)
Proc. Int. Conf. Security Cryptography
, pp. 321-326
-
-
Li, M.1
Zhang, Y.2
Bai, K.3
Zhang, W.4
Yu, M.5
He, X.6
-
40
-
-
84863977611
-
Incentive compatible moving target defense against VM-colocation attacks in clouds
-
Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang, "Incentive compatible moving target defense against VM-colocation attacks in clouds," in Proc. 27th IFIP TC 11 Inf. Security Privacy Conf., 2012, pp. 388-399.
-
(2012)
Proc. 27th IFIP TC 11 Inf. Security Privacy Conf.
, pp. 388-399
-
-
Zhang, Y.1
Li, M.2
Bai, K.3
Yu, M.4
Zang, W.5
-
41
-
-
84937709982
-
Co-location-resistant clouds
-
Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepard, "Co-location-resistant clouds," in Proc. 6th ACM Workshop Cloud Comput. Security, 2014, pp. 9-20.
-
(2014)
Proc. 6th ACM Workshop Cloud Comput. Security
, pp. 9-20
-
-
Azar, Y.1
Kamara, S.2
Menache, I.3
Raykova, M.4
Shepard, B.5
-
42
-
-
84893401667
-
Security games for virtual machine allocation in cloud computing
-
Y. Han, T. Alpcan, J. Chan, and C. Leckie, "Security games for virtual machine allocation in cloud computing," in Proc. 4th Int. Conf. Decision Game Theory Security, 2013, pp. 99-118.
-
(2013)
Proc. 4th Int. Conf. Decision Game Theory Security
, pp. 99-118
-
-
Han, Y.1
Alpcan, T.2
Chan, J.3
Leckie, C.4
-
43
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, "Live migration of virtual machines," in Proc. 2nd USENIX Symp. Netw. Syst. Des. Implementation, 2005, pp. 273-286.
-
(2005)
Proc. 2nd USENIX Symp. Netw. Syst. Des. Implementation
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
44
-
-
2442535151
-
Survey of multi-objective optimization methods for engineering
-
R. T. Marler and J. S. Arora, "Survey of multi-objective optimization methods for engineering," Struct. Multidisciplinary Optimization, vol. 26, no. 6, pp. 369-395, 2004.
-
(2004)
Struct. Multidisciplinary Optimization
, vol.26
, Issue.6
, pp. 369-395
-
-
Marler, R.T.1
Arora, J.S.2
-
45
-
-
84888065117
-
Analysing virtual machine usage in cloud computing
-
Y. Han, J. Chan, and C. Leckie, "Analysing virtual machine usage in cloud computing," in Proc. IEEE Int. Workshop Perform. Aspects Cloud Service Virtualization, 2013, pp. 370-377.
-
(2013)
Proc. IEEE Int. Workshop Perform. Aspects Cloud Service Virtualization
, pp. 370-377
-
-
Han, Y.1
Chan, J.2
Leckie, C.3
-
47
-
-
84919802732
-
Towards an understanding of oversubscription in cloud
-
S. A. Baset, L. Wang, and C. Tang, "Towards an understanding of oversubscription in cloud," in Proc. 2nd USENIX Conf. Hot Topics Manage. Internet, Cloud, Enterprise Netw. Serv., 2012, pp. 7-12.
-
(2012)
Proc. 2nd USENIX Conf. Hot Topics Manage. Internet, Cloud, Enterprise Netw. Serv.
, pp. 7-12
-
-
Baset, S.A.1
Wang, L.2
Tang, C.3
-
48
-
-
85027588190
-
-
Research cloud NeCTAR[Online]. Available
-
Research cloud NeCTAR[Online]. Available: Http://www.nectar. org.au/, 2011.
-
(2011)
-
-
|