I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel
暂无分享,去创建一个
Eric Eide | Robert Ricci | Jacobus E. van der Merwe | Hyun Wook Baek | R. Ricci | E. Eide | H. Baek | J. Merwe
[1] Pablo Neira Ayuso,et al. Netfilter's Connection Tracking System , 2006, login Usenix Mag..
[2] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[3] Florin Ciucu,et al. Distributed resource management across process boundaries , 2017, SoCC.
[4] Wei Xu,et al. Bidirectional LSTM-CRF Models for Sequence Tagging , 2015, ArXiv.
[5] R. Ricci,et al. Monitoring the Update Time of Virtual Firewalls in the Cloud , 2018 .
[6] Abhinav Srivastava,et al. CloudSight: A Tenant-Oriented Transparency Framework for Cross-Layer Cloud Troubleshooting , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[7] Kevin R. B. Butler,et al. Detecting co-residency with active traffic analysis techniques , 2012, CCSW '12.
[8] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[9] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[10] Zhenyu Wu,et al. A Measurement Study on Co-residence Threat inside the Cloud , 2015, USENIX Security Symposium.
[11] Rodrigo Fonseca,et al. Retro: Targeted Resource Management in Multi-tenant Distributed Systems , 2015, NSDI.
[12] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[13] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.
[14] Zhenyu Wu,et al. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[15] Christina Kluge,et al. Service-Oriented Architecture: Concepts, Technology, and Design , 2005 .
[16] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[17] Scott Shenker,et al. Adaptive Stream Processing using Dynamic Batch Sizing , 2014, SoCC.
[18] Benjamin Farley,et al. Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) , 2012, CCS.
[19] Jürgen Schmidhuber,et al. Framewise phoneme classification with bidirectional LSTM and other neural network architectures , 2005, Neural Networks.
[20] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[21] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[22] Thomas Erl,et al. Service-Oriented Architecture: Concepts, Technology, and Design , 2005 .
[23] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[24] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[25] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.