1 |
F. Liu, Q. Ge and Y. Yarom, "Catalyst: Defeating last-level cache side channel attacks in cloud computing," Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, pp. 406-418, Mar. 2016.
|
2 |
P. Barham, B. Dragovic and K. Fraser, "Xen and the art of virtualization," Proceedings of the ACM Special Interest Group in Operating Systems operating systems review, pp. 164-177, Dec. 2003.
|
3 |
A. Velte, and T. Velte, "Microsoft Virtualization with Hyper-V," McGraw-Hill, Inc., New York. USA, 448 pages, 2009.
|
4 |
Microsoft Hyper-V Integration Service, "https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/integration-services"
|
5 |
K. Okamura and Y. Oyama, "Load-based covert channels between xen virtual machines," Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 173-180, Mar. 2010.
|
6 |
Y. Xu, M. Bailey and K. Joshi, "An exploration of L2 cache covert channels in virtualized environments," Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 29-40, Oct. 2011.
|
7 |
Z. Wu, Z. Xu, and H. Wang, "Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud," Proceedings of the 21st USENIX Conference on Security Symposium, pp. 9-9, Aug. 2012.
|
8 |
T. Ristenpar, E. Tromer and H. Shacham, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212, Nov. 2009.
|
9 |
F. Liu, Y. Yarom and Q. Ge, "Last-level cache side-channel attacks are practical," Proceedings of the 2015 IEEE Symposium on Security and Privacy, pp. 605-622, May. 2015.
|
10 |
D. Sullivan, O. Arias and T. meade, "Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds," Proceedings of the Network and Distributed System Security Symposium, Feb. 2018.
|
11 |
Z. Yang and P. Chen, "Exploring virtual machine covert channel via i/o performance interference," Proceedings of the 2013 International Conference on Cloud Computing and Big Data, pp. 232-239, Dec. 2013.
|
12 |
M. Salaun, "Practical overview of a Xen covert channel," Journal in Computer Virology, Vol. 6, No. 4, pp. 317-328, Nov. 2010.
DOI
|
13 |
Y. Zhang and M.K. Reiter, "Duppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud," Proceedings of the 2013 ACM Special Interest Group on Security, Audit and Control, pp. 827-838, Nov. 2013.
|
14 |
J.Z. Wu, L. Ding and Y. Wang, "Identification and evaluation of sharing memory covert timing channel in Xen virtual machines" Proceedings of the IEEE 4th International Conference on Cloud Computing, pp. 283-291, Jul. 2011.
|
15 |
Q. Shen, M. Wan and Z. Zhang, "A covert channel using event channel state on xen hypervisor," Proceedings of the International Conference on Information and Communications Security, pp. 125-134, Nov. 2013.
|