Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks

[1]  ZiHao Wang,et al.  Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks , 2018, SecITC.

[2]  R. Sivaram Prasad,et al.  CloudQKDP: Quantum key distribution protocol for cloud computing , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[3]  Xiaoqing Tan Introduction to Quantum Cryptography , 2013 .

[4]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[5]  Klaus Wagner,et al.  Flush+Flush: A Stealthier Last-Level Cache Attack , 2015, ArXiv.

[6]  Samira Briongos,et al.  CacheShield: Detecting Cache Attacks through Self-Observation , 2018, CODASPY.

[7]  Jian Shen,et al.  Quantum Cryptography for the Future Internet and the Security Analysis , 2018, Secur. Commun. Networks.

[8]  Daisuke Miyamoto,et al.  Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment , 2018, Secur. Commun. Networks.

[9]  Sherali Zeadally,et al.  Virtualization: Issues, security threats, and solutions , 2013, CSUR.

[10]  Gorka Irazoqui Apecechea,et al.  S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES , 2015, 2015 IEEE Symposium on Security and Privacy.

[11]  Jean-Marc Menaud,et al.  Side-channels beyond the cloud edge: New isolation threats and solutions , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[12]  Cemal Yilmaz,et al.  SpyDetector: An approach for detecting side-channel attacks at runtime , 2018, International Journal of Information Security.

[13]  Yue Yin,et al.  Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[14]  Farhat Anwar,et al.  Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing , 2017 .

[15]  Yuval Yarom,et al.  FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.

[16]  Klaus Wagner,et al.  Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.

[17]  Ruby B. Lee,et al.  New models of cache architectures characterizing information leakage from cache side channels , 2014, ACSAC.

[18]  Ruby B. Lee,et al.  Analyzing Cache Side Channels Using Deep Neural Networks , 2018, ACSAC.

[19]  Nirbhay Chaubey,et al.  Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison , 2019, International Journal of Information Technology.

[20]  Michael K. Reiter,et al.  Cross-VM side channels and their use to extract private keys , 2012, CCS.

[21]  Guy Gogniat,et al.  Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).