Virtual machine isolation: A survey on the security of virtual machines

R Jithin, P Chandran - Recent Trends in Computer Networks and …, 2014 - Springer
The popularity and widespread adoption of cloud computing has resulted in extensified and
intensive use of virtualization technology. Virtualization technology allows the sharing of the …

Survey on covert channels in virtual machines and cloud computing

J Betz, D Westhoff, G Müller - Transactions on Emerging …, 2017 - Wiley Online Library
Covert channels have been known for a long time because of their versatile forms of
appearance. For nearly every technical improvement or change in technology, such …

Improving hard disk contention-based covert channel in cloud computing

B Lipinski, W Mazurczyk… - 2014 IEEE Security and …, 2014 - ieeexplore.ieee.org
Steganographic methods allow the covert exchange of secret data between parties aware of
the procedure. The cloud computing environment is a new and emerging target for …

A covert channel using event channel state on xen hypervisor

Q Shen, M Wan, Z Zhang, Z Zhang, S Qing… - … Conference on Information …, 2013 - Springer
Covert channel between virtual machines is one of serious threats to cloud computing, since
it will break the isolation of guest OSs. Even if a lot of work has been done to resist covert …

Whispers in the cloud-a covert channel using the result of creating a virtual machine

C Li, Q Shen, K Chen, Y Yang, Z Wu - International Conference on …, 2016 - scitepress.org
With the widespread use of cloud computing, people pay more attention to the security of
cloud platforms. For the case of some clouds, users are permitted to use the services, but …

[PDF][PDF] Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment

B Lipiński, W Mazurczyk, K Szczypiorski - Warsaw University of …, 2014 - Citeseer
Steganographic methods allow the covert exchange of secret data between parties aware of
the procedure. The cloud computing environment is a new and emerging target for …

[PDF][PDF] Esteganografía en protocolos de red

G Hernández López - 2013 - tesis.ipn.mx
La esteganografía es una disciplina que trata las técnicas para ocultar información dentro
de un medio que actuará como portador, el cual puede ser un archivo multimedia como …