Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to different customers share the same physical machine, new forms of cross-VM covert channel communication arise. In this paper, we explore one of these threats, L2 cache covert
β¦ LIBER β¦
[ACM Press the 3rd ACM workshop - Chicago, Illinois, USA (2011.10.21-2011.10.21)] Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11 - An exploration of L2 cache covert channels in virtualized environments
β Scribed by Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti; Schlichting, Richard
- Book ID
- 126987826
- Publisher
- ACM Press
- Year
- 2011
- Weight
- 595 KB
- Category
- Article
- ISBN
- 1450310044
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
[ACM Press the 3rd ACM workshop - Chicag
β
Xu, Yunjing; Bailey, Michael; Jahanian, Farnam; Joshi, Kaustubh; Hiltunen, Matti
π
Article
π
2011
π
ACM Press
π
English
β 595 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Naehrig, Michael; Lauter, Kristin; Vaikuntanathan, Vinod
π
Article
π
2011
π
ACM Press
β 510 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Brown, Andrew; Chase, Jeffrey S.
π
Article
π
2011
π
ACM Press
β 481 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Brown, Andrew; Chase, Jeffrey S.
π
Article
π
2011
π
ACM Press
π
English
β 481 KB
The applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the service provider. Our work addresses the problem of h
[ACM Press the 3rd ACM workshop - Chicag
β
Danezis, George; Livshits, Benjamin
π
Article
π
2011
π
ACM Press
β 812 KB
[ACM Press the 3rd ACM workshop - Chicag
β
Somorovsky, Juraj; Heiderich, Mario; Jensen, Meiko; Schwenk, JΓΆrg; Gruschka, Nil
π
Article
π
2011
π
ACM Press
β 739 KB