The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of h
β¦ LIBER β¦
[ACM Press the 3rd ACM workshop - Chicago, Illinois, USA (2011.10.21-2011.10.21)] Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 - Trusted platform-as-a-service
β Scribed by Brown, Andrew; Chase, Jeffrey S.
- Book ID
- 121672725
- Publisher
- ACM Press
- Year
- 2011
- Weight
- 481 KB
- Category
- Article
- ISBN
- 1450310044
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
[ACM Press the 3rd ACM workshop - Chicag
β
Brown, Andrew; Chase, Jeffrey S.
π
Article
π
2011
π
ACM Press
π
English
β 481 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Naehrig, Michael; Lauter, Kristin; Vaikuntanathan, Vinod
π
Article
π
2011
π
ACM Press
β 510 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Danezis, George; Livshits, Benjamin
π
Article
π
2011
π
ACM Press
β 812 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Somorovsky, Juraj; Heiderich, Mario; Jensen, Meiko; Schwenk, JΓΆrg; Gruschka, Nil
π
Article
π
2011
π
ACM Press
β 739 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti
π
Article
π
2011
π
ACM Press
β 595 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti
π
Article
π
2011
π
ACM Press
π
English
β 595 KB
Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert