Data exfiltration: A review of external attack vectors and countermeasures

F Ullah, M Edwards, R Ramdhany, R Chitchyan… - Journal of Network and …, 2018 - Elsevier
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …

S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES

G Irazoqui, T Eisenbarth, B Sunar - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
The cloud computing infrastructure relies on virtualized servers that provide isolation across
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

Using virtual machine allocation policies to defend against co-resident attacks in cloud computing

Y Han, J Chan, T Alpcan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud computing enables users to consume various IT resources in an on-demand manner,
and with low management overhead. However, customers can face new security risks when …

Cache attacks enable bulk key recovery on the cloud

MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth… - … and Embedded Systems …, 2016 - Springer
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …

A placement vulnerability study in {Multi-Tenant} public clouds

V Varadarajan, Y Zhang, T Ristenpart… - 24th USENIX Security …, 2015 - usenix.org
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud

MS Inci, B Gulmezoglu, G Irazoqui… - Cryptology ePrint …, 2015 - eprint.iacr.org
It has been six years since Ristenpart et al. demonstrated the viability of co-location and
provided the first concrete evidence for sensitive information leakage on a commercial …

A measurement study on co-residence threat inside the cloud

Z Xu, H Wang, Z Wu - … USENIX Security Symposium (USENIX Security 15 …, 2015 - usenix.org
As the most basic cloud service model, Infrastructure as a Service (IaaS) has been widely
used for serving the evergrowing computing demand due to the prevalence of the cloud …

How to 0wn nas in your spare time

S Hong, M Davinroy, Y Kaya, D Dachman-Soled… - arxiv preprint arxiv …, 2020 - arxiv.org
New data processing pipelines and novel network architectures increasingly drive the
success of deep learning. In consequence, the industry considers top-performing …