Author:
Buch Dhara H.,Bhatt Haresh S.
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering
Reference21 articles.
1. Betz J, Westhoff D, Müller G (2017) Survey on covert channels in virtual machines and cloud computing. Trans Emerg Telecommun Technol 28(6):3134
2. Seifert J, Koç Ç, Aciiçmez O (2007) Predicting secret keys via branch prediction. In: Ct-Rsa, pp 225–242
3. Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, pp 199–212
4. Aciiçmez O, Koç ÇK, Seifert J-P (2007) On the power of simple branch prediction analysis. In: Proceedings of the 2nd ACM symposium on information, computer and communications security, pp 312–320
5. Zhang Y, Juels A, Reiter MK, Ristenpart T (2012) Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on computer and communications security–CCS’12, p 305
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trilochan: a solution to detect cross-VM direct timing attack;Journal of Ambient Intelligence and Humanized Computing;2022-01-15
2. Flush+Reload Attacks on SEED;The Computer Journal;2021-08-05
3. Secure VM placement analysis against co-location based attack in cloud;Journal of Discrete Mathematical Sciences and Cryptography;2021-07-04
4. Modified Cache-Template Attack on AES;Scientia Iranica;2020-12-07