Scheduler vulnerabilities and coordinated attacks in cloud computing
暂无分享,去创建一个
[1] Heeseung Jo,et al. Task-aware virtual machine scheduling for I/O performance. , 2009, VEE '09.
[2] Dan Tsafrir,et al. Secretly Monopolizing the CPU Without Superuser Privileges , 2007, USENIX Security Symposium.
[3] Alan L. Cox,et al. Concurrent Direct Network Access for Virtual Machine Monitors , 2007, 2007 IEEE 13th International Symposium on High Performance Computer Architecture.
[4] Steven Hand,et al. Improving Xen security through disaggregation , 2008, VEE '08.
[5] Orin S. Kerr. Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes , 2003 .
[6] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[7] Peter Desnoyers,et al. Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.
[8] Ludmila Cherkasova,et al. Measuring CPU Overhead for I/O Processing in the Xen Virtual Machine Monitor , 2005, USENIX ATC, General Track.
[9] Jack J. Dongarra,et al. A set of level 3 basic linear algebra subprograms , 1990, TOMS.
[10] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[11] Dhabaleswar K. Panda,et al. High Performance VMM-Bypass I/O in Virtual Machines , 2006, USENIX Annual Technical Conference, General Track.
[12] Alan L. Cox,et al. Scheduling I/O in virtual machine monitors , 2008, VEE '08.
[13] Minglu Li,et al. The hybrid scheduling framework for virtual machine systems , 2009, VEE '09.
[14] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[15] Reinhold Weicker,et al. Dhrystone benchmark: rationale for version 2 and measurement rules , 1988, SIGP.
[16] David Chisnall,et al. The Definitive Guide to the Xen Hypervisor , 2007 .
[17] Steven McCanne,et al. A Randomized Sampling Clock for CPU Utilization Estimation and Code Profiling , 1993, USENIX Winter.
[18] Willy Zwaenepoel,et al. Diagnosing performance overheads in the xen virtual machine environment , 2005, VEE '05.
[19] Rogier Dittner,et al. The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server , 2007 .
[20] Matthias Hauswirth,et al. Producing wrong data without doing anything obviously wrong! , 2009, ASPLOS.
[21] Amin Vahdat,et al. Dynamic Scheduling of Virtual Machines Running HPC Workloads in Scientific Grids , 2007, 2009 3rd International Conference on New Technologies, Mobility and Security.
[22] Trent Jaeger,et al. Flexible security configuration for virtual machines , 2008, CSAW '08.
[23] Karsten Schwan,et al. High performance and scalable I/O virtualization via self-virtualized devices , 2007, HPDC '07.
[24] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[25] Anand Sivasubramaniam,et al. Xen and co.: communication-aware CPU scheduling for consolidated xen-based hosting platforms , 2007, VEE '07.
[26] Bernhard Jansen,et al. Policy enforcement and compliance proofs for Xen virtual machines , 2008, VEE '08.
[27] Amin Vahdat,et al. Enforcing Performance Isolation Across Virtual Machines in Xen , 2006, Middleware.