SeLance: Secure Load Balancing of Virtual Machines in Cloud
暂无分享,去创建一个
Qian Sun | Zhonghai Wu | Cong Li | Qingni Shen | Qingni Shen | Zhonghai Wu | Cong Li | Qian Sun
[1] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[2] Rajkumar Buyya,et al. Energy Efficient Allocation of Virtual Machines in Cloud Data Centers , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[3] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Angelos Stavrou,et al. HyperCheck: A Hardware-AssistedIntegrity Monitor , 2014, IEEE Trans. Dependable Secur. Comput..
[5] Mohsine Eleuldj,et al. OpenStack: Toward an Open-source Solution for Cloud Computing , 2012 .
[6] Ajay Gulati. VMware distributed resource Management : design , Implementation , and lessons learned , 2022 .
[7] Vyas Sekar,et al. Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration , 2015, CCS.
[8] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[9] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[10] Rajkumar Buyya,et al. OpenStack Neat: a framework for dynamic and energy‐efficient consolidation of virtual machines in OpenStack clouds , 2015, Concurr. Comput. Pract. Exp..
[11] Gorka Irazoqui Apecechea,et al. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES , 2015, 2015 IEEE Symposium on Security and Privacy.
[12] Cyrille Artho,et al. Memory deduplication as a threat to the guest OS , 2011, EUROSEC '11.
[13] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[14] Zhi Wang,et al. Isolating commodity hosted hypervisors with HyperLock , 2012, EuroSys '12.
[15] Weichao Wang,et al. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines , 2011, 30th IEEE International Performance Computing and Communications Conference.
[16] J. Koomey. Worldwide electricity used in data centers , 2008 .
[17] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[18] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[19] Rafal Wojtczuk,et al. Following the White Rabbit : Software attacks against Intel ( R ) VT-d technology , 2011 .
[20] Dan Tsafrir,et al. Virtual CPU validation , 2015, SOSP.