Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A placement vulnerability study in {Multi-Tenant} public clouds
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …
Bolt: I know what you did last summer... in the cloud
Cloud providers routinely schedule multiple applications per physical host to increase
efficiency. The resulting interference on shared resources often leads to performance …
efficiency. The resulting interference on shared resources often leads to performance …
Network-based secret communication in clouds: A survey
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …
cloud environments. But this transition comes at a cost: security and privacy solutions have …
[PDF][PDF] Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.
We introduce a new microarchitectural timing covert channel using the processor memory
order buffer (MOB). Specifically, we show how an adversary can infer the state of a spy …
order buffer (MOB). Specifically, we show how an adversary can infer the state of a spy …
Stopwatch: a cloud architecture for timing channel mitigation
This article presents StopWatch, a system that defends against timing-based side-channel
attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service …
attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service …
HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture
T Yu, Y **n, C Zhang - Electronics, 2024 - mdpi.com
Honeynet and honeypot originate as network security tools to collect attack information
during the network being compromised. With the development of virtualization and software …
during the network being compromised. With the development of virtualization and software …
[BUKU][B] The cloud security ecosystem: technical, legal, business and management issues
R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …
Ecosystem comprehensively discusses a range of cloud security topics from multi …
Socket overloading for fun and cache-poisoning
A Herzberg, H Shulman - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
We present a new technique, which we call socket overloading, that we apply for off-path
attacks on DNS. Socket overloading consists of short, low-rate, bursts of inbound packets …
attacks on DNS. Socket overloading consists of short, low-rate, bursts of inbound packets …
A comprehensive study of co-residence threat in multi-tenant public PaaS clouds
Abstract Public Platform-as-a-Service (PaaS) clouds are always multi-tenant. Applications
from different tenants may reside on the same physical machine, which introduces the risk of …
from different tenants may reside on the same physical machine, which introduces the risk of …
Memory dos attacks in multi-tenant clouds: Severity and mitigation
In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses
have been implemented, but severe DoS attacks on a victim's working memory by a single …
have been implemented, but severe DoS attacks on a victim's working memory by a single …