A placement vulnerability study in {Multi-Tenant} public clouds

V Varadarajan, Y Zhang, T Ristenpart… - 24th USENIX Security …, 2015 - usenix.org
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …

Bolt: I know what you did last summer... in the cloud

C Delimitrou, C Kozyrakis - ACM SIGARCH Computer Architecture News, 2017 - dl.acm.org
Cloud providers routinely schedule multiple applications per physical host to increase
efficiency. The resulting interference on shared resources often leads to performance …

Network-based secret communication in clouds: A survey

J Ullrich, T Zseby, J Fabini… - … communications surveys & …, 2017 - ieeexplore.ieee.org
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …

[PDF][PDF] Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.

D Sullivan, O Arias, T Meade, Y ** - NDSS, 2018 - **yier.me
We introduce a new microarchitectural timing covert channel using the processor memory
order buffer (MOB). Specifically, we show how an adversary can infer the state of a spy …

Stopwatch: a cloud architecture for timing channel mitigation

P Li, D Gao, MK Reiter - ACM Transactions on Information and System …, 2014 - dl.acm.org
This article presents StopWatch, a system that defends against timing-based side-channel
attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service …

HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture

T Yu, Y **n, C Zhang - Electronics, 2024 - mdpi.com
Honeynet and honeypot originate as network security tools to collect attack information
during the network being compromised. With the development of virtualization and software …

[BUKU][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Socket overloading for fun and cache-poisoning

A Herzberg, H Shulman - Proceedings of the 29th Annual Computer …, 2013 - dl.acm.org
We present a new technique, which we call socket overloading, that we apply for off-path
attacks on DNS. Socket overloading consists of short, low-rate, bursts of inbound packets …

A comprehensive study of co-residence threat in multi-tenant public PaaS clouds

W Zhang, X Jia, C Wang, S Zhang, Q Huang… - … Conference, ICICS 2016 …, 2016 - Springer
Abstract Public Platform-as-a-Service (PaaS) clouds are always multi-tenant. Applications
from different tenants may reside on the same physical machine, which introduces the risk of …

Memory dos attacks in multi-tenant clouds: Severity and mitigation

T Zhang, Y Zhang, RB Lee - arxiv preprint arxiv:1603.03404, 2016 - arxiv.org
In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses
have been implemented, but severe DoS attacks on a victim's working memory by a single …