[1] |
DESNOS A , FILIOL E , LEFOU I ,et al. Detecting (and creating!) a HVM rootkit (aka BluePill-like)[J]. Journal in Computer Virology, 2011,7(1): 23-49.
|
[2] |
RAZAVI K , GRAS B , BOSMAN E ,et al. Flip feng shui:hammering a needle in the software stack[C]// Usenix Security Symposium. 2016: 1-18.
|
[3] |
XIAO Y , ZHANG X , ZHANG Y ,et al. One bit flips,one cloud flops:cross-VM row hammer attacks and privilege escalation[C]// Usenix Security Symposium. 2016: 19-35.
|
[4] |
ZHANG T , ZHANG Y , LEE R . DoS attacks on your memory in the cloud[C]// ACM Symposium on Information,Computer and Communications Security. 2017: 253-265.
|
[5] |
IRAZOQUI G , INCI M S , EISENBARTH T ,et al. Fine grain cross-VM attacks on Xen and VMware[C]// ACM Conference on Cloud Computing. 2014: 737-744.
|
[6] |
IRAZOQUI G , INCI M S , EISENBARTH T ,et al. Wait a minute! a fast,cross-VM attack on AES[C]// International Symposium on Recent Advances in Intrusion Detection. 2014: 299-319.
|
[7] |
LIU F , YAROM Y , GE Q ,et al. Last-level cache side-channel attacks are practical[C]// IEEE Symposium on Security and Privacy. 2015: 605-622.
|
[8] |
IRAZOQUI G , EISENBARTH T , SUNAR B ,et al. Cross processor cache attacks[C]// ACM Conference on Computer and Communications Security. 2016: 353-364.
|
[9] |
YAROM Y , GENKIN D , HENINGER N ,et al. CacheBleed:a timing attack on OpenSSL constant time RSA[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2016: 346-367.
|
[10] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party computeclouds[C]// ACM Conference on Computer and Communications Security. 2009: 199-212.
|
[11] |
BATES A , MOOD B , PLETCHER J ,et al. Detecting co-residency with active traffic analysis techniques[C]// ACM Conference on Cloud Computing. 2012: 1-12.
|
[12] |
XU Z , WANG H , WU Z ,et al. A measurement study on co-residence threat inside the cloud[C]// Usenix Security Symposium. 2015: 929-944.
|
[13] |
王丽娜, 张浩, 余荣威 ,等. 基于 VPE 的可信虚拟域构建机制[J]. 通信学报, 2013,34(12): 167-177.
|
|
WANG L N , ZHANG H , YU R W ,et al. Building mechanism of trusted virtual domain via the VPE[J]. Journal on Communications, 2013,34(12): 167-177.
|
[14] |
ZHANG Y , JUELS A , OPREA A ,et al. HomeAlone:co-residency detection in the cloud via side-channel analysis[C]// IEEE Symposium on Security and Privacy. 2011: 313-328.
|
[15] |
余思, 桂小林, 张学军 ,等. 云环境中基于 cache 共享的虚拟机同驻检测方法[J]. 计算机研究与发展, 2013,50(12): 2651-2660.
|
|
YU S , GUI X L , ZHANG X J ,et al. Co-residency detection scheme based on shared cache in the cloud[J]. Journal of Computer Research and Development, 2013,50(12): 2651-2660.
|
[16] |
LIU F , GE Q , YAROM Y ,et al. CATalyst:defeating last-level cache side channel attacks in cloud computing[C]// IEEE International Symposium on High Performance Computer Architecture. 2016: 406-418.
|
[17] |
梁鑫, 桂小林, 戴慧珺 ,等. 云环境中跨虚拟机的 cache 侧信道攻击技术研究[J]. 计算机学报, 2017,40(2): 317-336.
|
|
LIANG X , GUI X L , DAI H J ,et al. Cross-VM cache side channel attacks in cloud:a survey[J]. Chinese Journal of Computers, 2017,40(2): 317-336.
|
[18] |
王国峰, 刘川意, 潘鹤中 ,等. 云计算模式内部威胁综述[J]. 计算机学报, 2017,40(2): 296-316.
|
|
WANG G F , LIU C Y , PAN H Z ,et al. Survey on insider threats to cloud computing[J]. Chinese Journal of Computers, 2017,40(2): 296-316.
|
[19] |
WANG L , LIU W , KUMAR N ,et al. A novel covert channel detection method in cloud based on XSRM and improved event association algorithm[J]. Security and Communication Networks, 2016,9(16): 3543-3557.
|
[20] |
IRAZOQUI G , EISENBARTH T , SUNAR B ,et al. S$A:a shared cache attack that works across cores and defies VM sandboxing-and its application to AES[C]// IEEE Symposium on Security and Privacy. 2015: 591-604.
|
[21] |
沈晴霓, 李卿 . 云计算环境中的虚拟机同驻安全问题综述[J]. 集成技术, 2015,4(5): 5-17.
|
|
SHEN Q N , LI Q . Review on co-residency security issues of virtual machines in cloud computing[J]. Journal of Integration Technology, 2015,4(5): 5-17.
|
[22] |
OSVIK D A , SHAMIR A , TROMER E . Cache attacks and countermeasures:the case of AES[C]// Cryptographers’ Track at the RSA Conference. 2006: 1-20.
|
[23] |
YAROM Y , FALKNER K . FLUSH+RELOAD:a high resolution,low noise,L3 cache side-channel attack[C]// Usenix Security Symposium. 2014: 719-732.
|
[24] |
MAURICE C , SCOUARNEC N L , NEUMANN C ,et al. Reverse engineering intel last-level cache complex addressing using performance counters[C]// International Symposium on Recent Advances in Intrusion Detection. 2015: 48-65.
|
[25] |
IRAZOQUI G , EISENBARTH T , SUNAR B ,et al. Systematic reverse engineering of cache slice selection in intel processors[C]// Euromicro Conference on Digital Systems Design. 2015: 629-636.
|
[26] |
WU Z , XU Z , WANG H ,et al. Whispers in the hyper-space:high-bandwidth and reliable covert channel attacks inside the cloud[J]. IEEE/ACM Transactions on Networking, 2015,23(2): 603-615.
|
[27] |
PAAR C , PELZL J . Understanding cryptography:a textbook for students and practitioners[M]. Springer Science & Business Media, 2009.
|
[28] |
LI P , GAO D , REITER M K ,et al. Replica placement for availability in the worst case[C]// International Conference on Distributed Computing Systems. 2015: 599-608.
|
[29] |
MOON S , SEKAR V , REITER M K ,et al. Nomad:mitigating arbitrary cloud side channels via provider-assisted migration[C]// ACM Conference on Computer and Communications Security. 2015: 1595-1606.
|
[30] |
LIU W , GAO D , REITER M K . On-demand time blurring to support side-channel defense[C]// European Symposium on Research in Computer Security. 2017: 210-228.
|
[31] |
NEEDLEMAN S B , WUNSCH C D . A general method applicable to the search for similarities in the amino acid sequence of two proteins[J]. Journal of Molecular Biology, 1970,48(3): 443-453.
|
[32] |
VARADARAJAN V , ZHANG Y , RISTENPART T ,et al. A placement vulnerability study in multi-tenant public clouds[C]// Usenix Security Symposium. 2015: 913-928.
|