[1] |
MIJUMBI R , SERRAT J , GORRICHO J ,et al. Network function virtualization:state-of-the-art and research challenges[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 236-262.
|
[2] |
WU J X . Thoughts on the development of novel network technology[J]. Science China (Information Sciences), 2018,61(10): 144-154.
|
[3] |
FIROOZJAEI M D , JEONG J P , KO H ,et al. Security challenges with network functions virtualization[J]. Future Generation Computer Systems, 2017,67(7): 315-324.
|
[4] |
胡威 . 基于 SGX 的虚拟网络功能安全保护机制研究[D]. 武汉:武汉大学, 2017.
|
|
HU W . Research on security protection mechanism of virtual network function based on SGX[D]. Wuhan:Wuhan University, 2017.
|
[5] |
BAZM M , LACOSTE M , SUDHOLT M . Isolation in cloud computing infrastructures:new security challenges[J]. Annals of Telecommunications, 2019,74(1): 197-209.
|
[6] |
梁鑫, 桂小林, 戴慧珺 ,等. 云环境中跨虚拟机的 Cache 侧信道攻击技术研究[J]. 计算机学报, 2017,40(2): 317-336.
|
|
LIANG X , GUI X L , DAI H J ,et al. Cross-VM cache side channel attacks in cloud:a survey[J]. Chinese Journal of Computer, 2017,40(2): 317-336.
|
[7] |
LYU Y , MISHRA P . A survey of side-channel attacks on caches and countermeasures[J]. Journal of Hardware and Systems Security, 2018,2(1): 33-50.
|
[8] |
何佩聪, 黄汝维, 陈宁江 ,等. 云环境中的侧通道攻击研究进展[J]. 计算机应用研究, 2018,35(4): 969-973.
|
|
HE P C , HUANG R W , CHEN N J ,et al. Research progress on side-channel attacks in cloud environment[J]. Application Research of Computer, 2018,35(4): 969-973.
|
[9] |
LIU S , CAI Z , XU H ,et al. Towards security-aware virtual network embedding[J]. Computer Networks, 2015,91(11): 151-163.
|
[10] |
HAN Y , CHAN J , ALPCAN T ,et al. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(1): 95-108.
|
[11] |
HAN Y , ALPCAN T , CHAN J ,et al. A game theoretical approach to defend against co-resident attacks in cloud computing:preventing co-residence using semi-supervised learning[J]. IEEE Transactions on Information Forensics and Security, 2016,11(3): 556-570.
|
[12] |
XU Z , WAND H , WU Z . A measurement study on co-residence threat inside the cloud[C]// Proceedings of the 24th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2015: 929-944.
|
[13] |
AINAPURE B S , SHAH D , RAO A A . Understanding perception of cache-based side-channel attack on cloud environment[M]. Berlin: SpringerPress, 2017.
|
[14] |
赵硕, 季新生, 毛宇星 ,等. 基于安全等级的虚拟机动态迁移方法[J]. 通信学报, 2017,38(7): 165-174.
|
|
ZHAO S , JI X S , MAO Y S ,et al. Research on dynamic migration of virtual machine based on security level[J]. Journal on Communications, 2017,38(7): 165-174.
|
[15] |
MOON S , SEKAR V , REITER M . Nomad:mitigating arbitrary cloud side channels via provider-assisted migration[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 1595-1606.
|
[16] |
ATYA A O F , QIAN Z , KRISHNAMURTHY S V ,et al. Malicious co-residency on the cloud:attacks and defense[C]// IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2017: 1-9.
|
[17] |
ZHANG T , ZHANG Y , LEE R B . CloudRadar:a real-time side-channel attack detection system in clouds[C]// International Symposium on Research in Attacks,Intrusions,and Defenses. Berlin:Springer, 2016: 118-140.
|
[18] |
伊鹏, 谢记超, 张震 ,等. 抗侧信道攻击的服务功能链部署方法[J]. 电子与信息学报, 2019,41(11): 2699-2707.
|
|
YI P , XIE J C , ZHANG Z ,et al. A service function chain deployment method against side channel attack[J]. Journal of Electronics and Information Technology, 2019,41(11): 2699-2707.
|
[19] |
龚水清, 陈靖, 黄聪会 ,等. 信任感知的安全虚拟网络映射算法[J]. 通信学报, 2015,36(11): 180-189.
|
|
GONG S Q , CHEN J , HUANG H C ,et al. Trust-aware secure virtual network embedding algorithm[J]. Journal on Communications, 2015,36(11): 180-189.
|
[20] |
LI D , HONG P , XUE K ,et al. Virtual network function placement considering resource optimization and SFC requests in cloud datacenter[J]. IEEE Transactions on Parallel and Distributed Systems, 2018,29(7): 1664-1677.
|
[21] |
BARI F , CHOWDHURY S R , AHMED R ,et al. Orchestrating virtualized network functions[J]. IEEE Transactions on Network and Service Management, 2016,13(4): 725-739.
|