[1] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// ACM Conference on Computer and Communications Security. 2009.
|
[2] |
APECECHEA G I , INCI M S , EISENBARTH T ,et al. Fine grain cross-VM attacks on Xen and VMware are possible![J]. Ecewp.ece.wpi.edu, 2014
|
[3] |
OSVIK D A , SHAMIR A , TROMER E . Cache attacks and countermeasures:the case of AES[J]. Lecture Notes in Computer Science, 2006,(2005): 1-20.
|
[4] |
YAROM Y , FALKNER K . FLUSH+RELOAD:a high resolution,low noise,L3 cache side-channel attack[C]// Usenix Conference on Security Symposium. 2014: 719-732.
|
[5] |
ZHANG Y , REITER M K . Düppel:retrofitting commodity operating systems to mitigate cache side channels in the cloud[C]// ACM Sigsac Conference on Computer & Communications Security. 2013.
|
[6] |
WANG Z , LEE R B . A novel cache architecture with enhanced performance and security[C]// IEEE/ACM International Symposium on Microarchitecture. 2008.
|
[7] |
MOON S J , SEKAR V , REITER M K . Nomad:mitigating arbitrary cloud side channels via provider-assisted migration[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 1595-1606.
|
[8] |
AVIZIENIS A , CHEN L . On the implementation of N-version programming for software fault tolerance during program execution[J]. Proc of the Compsac, 1977,6(1): 25-37.
|
[9] |
FORREST S , SOMAYAJI A , ACKLEY D . Building diverse computer systems[C]// The Workshop on Hot Topics in Operating Systems. 1997: 67-72.
|
[10] |
HOFMEYR S A , FORREST S . Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8(4): 443-473.
|
[11] |
GASHI I , POPOV P , STRIGINI L . Fault tolerance via diversity for off-the-shelf products:a study with SQL database servers[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(4): 280-294.
|
[12] |
NEWELL A , OBENSHAIN D , TANTILLO T ,et al. Increasing network resiliency by optimally assigning diverse variants to routing nodes[C]// IEEE/IFIP International Conference on Dependable Systems and Networks. 2013.
|
[13] |
GARCIA M , BESSANI A , GASHI I ,et al. Analysis of operating system diversity for intrusion tolerance[J]. Software-practice &Experience, 2014,44(6): 735-770.
|
[14] |
BATES A , MOOD B , PLETCHER J ,et al. Detecting co-residency with active traffic analysis techniques[C]// The 2012 ACM Workshop on Cloud Computing Security Workshop. 2012
|
[15] |
ZHANG Y , JUELS A , OPREA A ,et al. HomeAlone:co-residency detection in the cloud via side-channel analysis[C]// IEEE Symposium on Security and Privacy. 2011.
|
[16] |
ZHANG Y , JUELS A , REITER M K ,et al. Cross-VM side channels and their use to extract private keys[C]// ACM Conference on Computer and Communications Security. 2012
|
[17] |
LEINSTER T , COBBOLD C A . Measuring diversity:the importance of species similarity[J]. Ecology, 2012,93(3):477.
|
[18] |
HAN Y , CHAN J , ALPCAN T ,et al. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing[J]. IEEE Transactions on Dependable & Secure Computing, 2017,14(1): 95-108.
|