Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

{FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack

Y Yarom, K Falkner - 23rd USENIX security symposium (USENIX security …, 2014 - usenix.org
Sharing memory pages between non-trusting processes is a common method of reducing
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …

Cache template attacks: Automating attacks on inclusive {Last-Level} caches

D Gruss, R Spreitzer, S Mangard - 24th USENIX Security Symposium …, 2015 - usenix.org
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …

Another flip in the wall of rowhammer defenses

D Gruss, M Lipp, M Schwarz, D Genkin… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …

Cross-tenant side-channel attacks in PaaS clouds

Y Zhang, A Juels, MK Reiter, T Ristenpart - Proceedings of the 2014 …, 2014 - dl.acm.org
We present a new attack framework for conducting cache-based side-channel attacks and
demonstrate this framework in attacks between tenants on commercial Platform-as-a …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Flip feng shui: Hammering a needle in the software stack

K Razavi, B Gras, E Bosman, B Preneel… - 25th USENIX Security …, 2016 - usenix.org
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …

Dedup est machina: Memory deduplication as an advanced exploitation vector

E Bosman, K Razavi, H Bos… - 2016 IEEE symposium on …, 2016 - ieeexplore.ieee.org
Memory deduplication, a well-known technique to reduce the memory footprint across virtual
machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 …

{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud

T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …