Security issues and challenges for virtualization technologies

F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

Democratizing container live migration for enhanced future networks-a survey

W Soussi, G Gür, B Stiller - ACM Computing Surveys, 2024 - dl.acm.org
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with
shared infrastructure among multiple tenants and applications with high availability …

Cloudradar: A real-time side-channel attack detection system in clouds

T Zhang, Y Zhang, RB Lee - Research in Attacks, Intrusions, and Defenses …, 2016 - Springer
We present CloudRadar, a system to detect, and hence mitigate, cache-based side-channel
attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it …

Attack directories, not caches: Side channel attacks in a non-inclusive world

M Yan, R Sprabery, B Gopireddy… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Although clouds have strong virtual memory isolation guarantees, cache attacks stemming
from shared caches have proved to be a large security problem. However, despite the past …

Smartnic performance isolation with fairnic: Programmable networking for the cloud

S Grant, A Yelam, M Bland, AC Snoeren - Proceedings of the Annual …, 2020 - dl.acm.org
Multiple vendors have recently released SmartNICs that provide both special-purpose
accelerators and programmable processing cores that allow increasingly sophisticated …

Truspy: Cache side-channel information leakage from the secure world on arm devices

N Zhang, K Sun, D Shands, W Lou… - Cryptology ePrint Archive, 2016 - eprint.iacr.org
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …

Towards attack-resistant service function chain migration: A model-based adaptive proximal policy optimization approach

T Zhang, C Xu, B Zhang, X Li, X Kuang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Network function virtualization (NFV) supports the rapid development of service function
chain (SFC), which efficiently connects a sequence of network virtual function instances …

Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud

H **, Z Li, D Zou, B Yuan - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
Due to the lightweight features, the combination of container technology and microservice
architecture makes container-based cloud environment more efficient and agile than VM …

Security of cloud FPGAs: A survey

C **, V Gohil, R Karri, J Rajendran - arxiv preprint arxiv:2005.04867, 2020 - arxiv.org
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …