Cyber Security Aspects of Virtualization in Cloud Computing Environments: Analyzing Virtualization-Specific Cyber Security Risks
暂无分享,去创建一个
[1] ZiHao Wang,et al. Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks , 2018, SecITC.
[2] R. Sivaram Prasad,et al. CloudQKDP: Quantum key distribution protocol for cloud computing , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[3] Xiaoqing Tan. Introduction to Quantum Cryptography , 2013 .
[4] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[5] Klaus Wagner,et al. Flush+Flush: A Stealthier Last-Level Cache Attack , 2015, ArXiv.
[6] Samira Briongos,et al. CacheShield: Detecting Cache Attacks through Self-Observation , 2018, CODASPY.
[7] Jian Shen,et al. Quantum Cryptography for the Future Internet and the Security Analysis , 2018, Secur. Commun. Networks.
[8] Daisuke Miyamoto,et al. Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment , 2018, Secur. Commun. Networks.
[9] Sherali Zeadally,et al. Virtualization: Issues, security threats, and solutions , 2013, CSUR.
[10] Gorka Irazoqui Apecechea,et al. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Jean-Marc Menaud,et al. Side-channels beyond the cloud edge: New isolation threats and solutions , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[12] Cemal Yilmaz,et al. SpyDetector: An approach for detecting side-channel attacks at runtime , 2018, International Journal of Information Security.
[13] Yue Yin,et al. Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).
[14] Farhat Anwar,et al. Cryptography as a Service (CaaS): Quantum Cryptography for Secure Cloud Computing , 2017 .
[15] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[16] Klaus Wagner,et al. Flush+Flush: A Fast and Stealthy Cache Attack , 2015, DIMVA.
[17] Ruby B. Lee,et al. New models of cache architectures characterizing information leakage from cache side channels , 2014, ACSAC.
[18] Ruby B. Lee,et al. Analyzing Cache Side Channels Using Deep Neural Networks , 2018, ACSAC.
[19] Nirbhay Chaubey,et al. Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison , 2019, International Journal of Information Technology.
[20] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[21] Guy Gogniat,et al. Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).