Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security issues in cloud environments: a survey
DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …
integration of cloud environments in the industry, which has been consequently motivating …
Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
{FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack
Sharing memory pages between non-trusting processes is a common method of reducing
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …
Cache template attacks: Automating attacks on inclusive {Last-Level} caches
Recent work on cache attacks has shown that CPU caches represent a powerful source of
information leakage. However, existing attacks require manual identification of …
information leakage. However, existing attacks require manual identification of …
Another flip in the wall of rowhammer defenses
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
Cross-tenant side-channel attacks in PaaS clouds
We present a new attack framework for conducting cache-based side-channel attacks and
demonstrate this framework in attacks between tenants on commercial Platform-as-a …
demonstrate this framework in attacks between tenants on commercial Platform-as-a …
Security and privacy in cloud computing
Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
Flip feng shui: Hammering a needle in the software stack
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on …
Dedup est machina: Memory deduplication as an advanced exploitation vector
Memory deduplication, a well-known technique to reduce the memory footprint across virtual
machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 …
machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 …
{STEALTHMEM}:{System-Level} protection against {Cache-Based} side channel attacks in the cloud
T Kim, M Peinado, G Mainar-Ruiz - 21st USENIX Security Symposium …, 2012 - usenix.org
Cloud services are rapidly gaining adoption due to the promises of cost efficiency,
availability, and on-demand scaling. To achieve these promises, cloud providers share …
availability, and on-demand scaling. To achieve these promises, cloud providers share …