Characterizing hypervisor vulnerabilities in cloud computing servers
暂无分享,去创建一个
[1] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[2] Jennifer Rexford,et al. Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.
[3] Воробьев Антон Александрович. Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .
[4] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[5] Daniel E. Geer. Attack surface inflation , 2011, IEEE Security & Privacy.
[6] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[7] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[8] S. K. Dubey,et al. Security and Privacy in Cloud Computing: A Survey , 2013 .
[9] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[10] Sugata Sanyal,et al. A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.
[11] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[12] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[13] Jiang Wang,et al. Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor , 2013 .
[14] Jennifer Rexford,et al. NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.
[15] Niraj K. Jha,et al. Secure Virtual Machine Execution under an Untrusted Management OS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[16] Henry L. Owen,et al. Detecting and categorizing kernel-level rootkits to aid future detection , 2006, IEEE Security & Privacy Magazine.
[17] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.