Slicedup: a tenant-aware memory deduplication for cloud computing
暂无分享,去创建一个
[1] Cyrille Artho,et al. Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication , 2012, EuroSec 2012.
[2] Herbert Bos,et al. Flip Feng Shui: Hammering a Needle in the Software Stack , 2016, USENIX Security Symposium.
[3] Risto M. Hakala,et al. Cache-Timing Template Attacks , 2009, ASIACRYPT.
[4] Thomas R. Gross,et al. CAIN: Silently Breaking ASLR in the Cloud , 2015, WOOT.
[5] Ismael Ripoll,et al. Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers , 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications.
[6] Stefan Mangard,et al. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches , 2015, USENIX Security Symposium.
[7] Hai Huang,et al. Security implications of memory deduplication in a virtualized environment , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[8] Weichao Wang,et al. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines , 2011, 30th IEEE International Performance Computing and Communications Conference.
[9] Per Larsen,et al. Leakage-Resilient Layout Randomization for Mobile Devices , 2016, NDSS.
[10] Stefan Mangard,et al. Practical Memory Deduplication Attacks in Sandboxed Javascript , 2015, ESORICS.
[11] Achim Streit,et al. Reducing the Memory Footprint of Parallel Applications with KSM , 2012, Facing the Multicore-Challenge.
[12] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[13] Cyrille Artho,et al. Software Side Channel Attack on Memory Deduplication , 2011, SOSP 2011.
[14] Naomi Benger,et al. "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way , 2014, CHES.
[15] Herbert Bos,et al. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[16] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[17] Cyrille Artho,et al. Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[18] George Varghese,et al. Difference engine , 2010, OSDI.
[19] Herbert Bos,et al. Secure Page Fusion with VUsion: https://www.vusec.net/projects/VUsion , 2017, SOSP.
[20] Gorka Irazoqui Apecechea,et al. Wait a Minute! A fast, Cross-VM Attack on AES , 2014, RAID.
[21] Cyrille Artho,et al. Memory deduplication as a threat to the guest OS , 2011, EUROSEC '11.
[22] Craig Disselkoen,et al. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX , 2017, USENIX Security Symposium.
[23] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[24] Yuhui Deng,et al. Memory Deduplication: An Effective Approach to Improve the Memory System , 2017, J. Inf. Sci. Eng..
[25] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[26] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.
[27] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[28] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[29] Gorka Irazoqui Apecechea,et al. Lucky 13 Strikes Back , 2015, AsiaCCS.
[30] Jian Liu,et al. WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.
[31] Peter J. Denning. The locality principle , 2005, Commun. ACM.
[32] Hai Huang,et al. A covert channel construction in a virtualized environment , 2012, CCS '12.
[33] Mathias Payer,et al. HexPADS: A Platform to Detect "Stealth" Attacks , 2016, ESSoS.
[34] Gorka Irazoqui Apecechea,et al. A Faster and More Realistic Flush+Reload Attack on AES , 2015, COSADE.
[35] Naomi Benger,et al. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack , 2014, IACR Cryptol. ePrint Arch..
[36] Stéphan Jourdan,et al. Haswell: The Fourth-Generation Intel Core Processor , 2014, IEEE Micro.
[37] Klaus Wagner,et al. Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.