Data exfiltration: A review of external attack vectors and countermeasures
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES
The cloud computing infrastructure relies on virtualized servers that provide isolation across
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
Using virtual machine allocation policies to defend against co-resident attacks in cloud computing
Cloud computing enables users to consume various IT resources in an on-demand manner,
and with low management overhead. However, customers can face new security risks when …
and with low management overhead. However, customers can face new security risks when …
Cache attacks enable bulk key recovery on the cloud
Cloud services keep gaining popularity despite the security concerns. While non-sensitive
data is easily trusted to cloud, security critical data and applications are not. The main …
data is easily trusted to cloud, security critical data and applications are not. The main …
A placement vulnerability study in {Multi-Tenant} public clouds
Public infrastructure-as-a-service clouds, such as Amazon EC2, Google Compute Engine
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …
(GCE) and Microsoft Azure allow clients to run virtual machines (VMs) on shared physical …
A survey of side-channel attacks on caches and countermeasures
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …
trustworthiness are key considerations in designing computing devices. A vast majority of …
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
It has been six years since Ristenpart et al. demonstrated the viability of co-location and
provided the first concrete evidence for sensitive information leakage on a commercial …
provided the first concrete evidence for sensitive information leakage on a commercial …
A measurement study on co-residence threat inside the cloud
As the most basic cloud service model, Infrastructure as a Service (IaaS) has been widely
used for serving the evergrowing computing demand due to the prevalence of the cloud …
used for serving the evergrowing computing demand due to the prevalence of the cloud …
How to 0wn nas in your spare time
New data processing pipelines and novel network architectures increasingly drive the
success of deep learning. In consequence, the industry considers top-performing …
success of deep learning. In consequence, the industry considers top-performing …