Affiliation:
1. Egypt-Japan University of Science and Technology (E-JUST)
2. Alexandria University
3. Waseda University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference16 articles.
1. [1] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol.28, no.3, pp.583-592, 2012. 10.1016/j.future.2010.12.006
2. [2] M. Hataba, A. El-Mahdy, and E. Rohou, OJIT: A novel obfuscation approach using standard just-in-time compiler transformations, 4th Int. Workshop on Dynamic Compilation Everywhere, 2015.
3. [3] M. Hataba, R. Elkhouly, and A. El-Mahdy, “Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional Branches,” IEEE 35th International Conference on Distributed Computing Systems Workshops, pp.120-127, 2015. 10.1109/icdcsw.2015.37
4. [4] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” 16th ACM conference on Computer and communications security, pp.199-212, 2009. 10.1145/1653662.1653687
5. [5] S. Chari, C.S. Jutla, J.R. Rao, ad P. Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” 19th Annual International Cryptology Conference, vol.1666, pp.398-412, 1999. 10.1007/3-540-48405-1_26