Cross-Tenant Side-Channel Attacks in PaaS Clouds
暂无分享,去创建一个
Michael K. Reiter | Thomas Ristenpart | Ari Juels | Yinqian Zhang | A. Juels | M. Reiter | T. Ristenpart | Yinqian Zhang | Thomas Ristenpart
[1] Cyrille Artho,et al. Memory deduplication as a threat to the guest OS , 2011, EUROSEC '11.
[2] Tibor Jager,et al. Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption , 2012, ESORICS.
[3] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[4] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[5] Paul England,et al. Resource management for isolation enhanced cloud services , 2009, CCSW '09.
[6] Yoshitaka Nagami,et al. An Independent Evaluation of Web Timing Attack and its Countermeasure , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[7] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[8] Aggelos Kiayias,et al. I Forgot Your Password: Randomness Attacks Against PHP Applications , 2012, USENIX Security Symposium.
[9] Ramakrishna Gummadi,et al. Determinating timing channels in compute clouds , 2010, CCSW '10.
[10] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[11] Dan Boneh,et al. Exposing private information by timing web applications , 2007, WWW '07.
[12] Gorka Irazoqui Apecechea,et al. Wait a Minute! A fast, Cross-VM Attack on AES , 2014, RAID.
[13] Hovav Shacham,et al. Eliminating fine grained timers in Xen , 2011, CCSW '11.
[14] Taesoo Kim,et al. STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud , 2012, USENIX Security Symposium.
[15] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[16] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[17] David Schultz,et al. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks , 2005, ICISC.
[18] Michael L. Scott,et al. False sharing and its effect on shared memory performance , 1993 .
[19] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Weichao Wang,et al. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines , 2011, 30th IEEE International Performance Computing and Communications Conference.
[21] Peng Li,et al. Mitigating access-driven timing channels in clouds using StopWatch , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[22] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[23] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[24] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[25] Michael K. Reiter,et al. Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud , 2013, CCS.
[26] Graham Steel,et al. Efficient Padding Oracle Attacks on Cryptographic Hardware , 2012, IACR Cryptol. ePrint Arch..
[27] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[28] Jan Reineke,et al. CacheAudit: A Tool for the Static Analysis of Cache Side Channels , 2013, TSEC.
[29] Frances E. Allen,et al. Control-flow analysis , 2022 .
[30] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[31] Michael M. Swift,et al. Scheduler-based Defenses against Cross-VM Side-channels , 2014, USENIX Security Symposium.
[32] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.