[1] |
SONG B , HASSAN M M , HUH E N . Delivering IPTV service over a virtual network:a study on virtual network topology[J]. Journal of Communications & Networks, 2012,14(14): 319-335.
|
[2] |
CHOWDHURY N M M K , BOUTABA R . A survey of network virtualization[J]. Computer Networks, 2010,54(5): 862-876.
|
[3] |
FISCHER A , BOTERO J F , TILL B M ,et al. Virtual network embedding:a survey[J]. IEEE Communications Surveys & Tutorials, 2013,15(4): 1888-1906.
|
[4] |
CHOWDHURY N M M K , BOUTABA R . Network virtualization:state of the art and research challenges[J]. IEEE Communications Magazine, 2009,47(7): 20-26.
|
[5] |
WANG Y , CHAU P , CHEN F . A framework for security-aware virtual network embedding[C]// International Conference on Computer Communication and Networks. IEEE, 2015.
|
[6] |
PIGNOLET Y A , SCHMID S , TREDAN G . Adversarial VNet embeddings:a threat for ISPs?[J]. Proceedings - IEEE INFOCOM, 2013,12(11): 415-419.
|
[7] |
CHAU P , WANG Y . Security-awareness in network virtualization:a classified overview[C]// IEEE,International Conference on Mobile Ad Hoc and Sensor Systems. IEEE Computer Society, 2014: 545-550.
|
[8] |
TAHIR R , KHAN M T , GONG X ,et al. Sneak-peek:high speed covert channels in data center networks[C]// 2016 IEEE Conference on Computer Communications (INFOCOM). IEEE, 2016.
|
[9] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// ACM Conference on Computer and Communications Security, 2009: 199-212.
|
[10] |
IRAZOQUI G , EISENBARTH T , SUNAR B . S$A:a shared cache attack that works across cores and defies VM sandboxing--and its application to AES[C]// IEEE Symposium on Security & Privacy. IEEE, 2015: 591-604.
|
[11] |
LIU F , YAROM Y , GE Q ,et al. Last-level cache side-channel attacks are practical[J]. IEEE Symposium on Security & Privacy, 2015: 605-622.
|
[12] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANGY Y Q , WANG X F , LIU X F ,et al. survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[13] |
VARADARAJAN V , RISTENPART T , SWIFT M . Scheduler-based defenses against cross-VM side-channels[C]// 23rd USENIX Security Symposium (USENIX Security 14). 2014: 687-702.
|
[14] |
MOON S J , SEKAR V , REITER M K . Nomad:mitigating arbitrary cloud side channels via provider-assisted migration[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015: 1595-1606.
|
[15] |
ZHANG Y , LI M , BAI K ,et al. Incentive compatible moving target defense against VM-colocation attacks in clouds[M]// Information Security and Privacy Research. Springer Berlin Heidelberg, 2012: 388-399.
|
[16] |
EVANS D , NGUYENTUONG A , KNIGHT J . Effectiveness of moving target defenses[M]// Moving Target Defense, 2011: 29-48.
|
[17] |
龚水清, 陈靖, 黄聪会 ,等. 信任感知的安全虚拟网络映射算法[J]. 通信学报, 2015,36(11): 180-189.
|
|
GONG S Q , CHEN J , HUANG C H ,et al. Trust-aware secure virtual network embedding algorithm[J]. Journal on Communications, 2015,36(11): 180-189.
|
[18] |
SUZAKI K , IIJIMA K , YAGI T ,et al. Memory deduplication as a threat to the guest OS[C]// The Fourth European Workshop on System Security (EUROSEC). 2011: 1-6.
|
[19] |
OWENS R , WANG W . Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines[J]. IEEE International Performance Computing & Communications, 2011,8069(5): 1-8.
|
[20] |
LI P , GAO D , REITER M K . Stopwatch:a cloud architecture for timing channel mitigation[J]. ACM Transactions on Information &System Security, 2014,17(2): 1-28.
|
[21] |
ZHANG Y , REITER M K . Düppel:retrofitting commodity operating systems to mitigate cache side channels in the cloud[C]// ACM Sigsac Conference on Computer & Communications Security. 2013: 827-838.
|
[22] |
PATTUK E , KANTARCIOGLU M , LIN Z ,et al. Preventing cryptographic key leakage in cloud virtual machines[C]// 23rd USENIX Security Symposium (USENIX Security 14). 2014: 703-718.
|
[23] |
WANG Z , LEE R B . A novel cache architecture with enhanced performance and security[C]// 2008 41st IEEE/ACM International Symposium on Microarchitecture. IEEE, 2008: 83-93.
|
[24] |
GILLANI F , AL-SHAER E , LO S ,et al. Agile virtualized infrastructure to proactively defend against cyber attacks[C]// 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, 2015: 729-737.
|