1. Detecting covert timing channels with time? deterministic replay;chen;11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14),2014
2. A placement vulnerability study in multi? tenant public clouds;varadarajan;24th USENIX Security Symposium (USENIX Security 15),2015
3. The case for a cloud access security broker,0
4. Mutual verifiable provable data auditing in public cloud storage;ren;Journal of Internet Technology,2015