Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security issues and challenges for virtualization technologies
F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …
an easy-to-implement platform for scalable, high-availability services, they also introduce …
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
Democratizing container live migration for enhanced future networks-a survey
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with
shared infrastructure among multiple tenants and applications with high availability …
shared infrastructure among multiple tenants and applications with high availability …
Cloudradar: A real-time side-channel attack detection system in clouds
We present CloudRadar, a system to detect, and hence mitigate, cache-based side-channel
attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it …
attacks in multi-tenant cloud systems. CloudRadar operates by correlating two events: first, it …
Attack directories, not caches: Side channel attacks in a non-inclusive world
Although clouds have strong virtual memory isolation guarantees, cache attacks stemming
from shared caches have proved to be a large security problem. However, despite the past …
from shared caches have proved to be a large security problem. However, despite the past …
Smartnic performance isolation with fairnic: Programmable networking for the cloud
Multiple vendors have recently released SmartNICs that provide both special-purpose
accelerators and programmable processing cores that allow increasingly sophisticated …
accelerators and programmable processing cores that allow increasingly sophisticated …
Truspy: Cache side-channel information leakage from the secure world on arm devices
As smart, embedded devices are increasingly integrated into our daily life, the security of
these devices has become a major concern. The ARM processor family, which powers more …
these devices has become a major concern. The ARM processor family, which powers more …
Towards attack-resistant service function chain migration: A model-based adaptive proximal policy optimization approach
Network function virtualization (NFV) supports the rapid development of service function
chain (SFC), which efficiently connects a sequence of network virtual function instances …
chain (SFC), which efficiently connects a sequence of network virtual function instances …
Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud
Due to the lightweight features, the combination of container technology and microservice
architecture makes container-based cloud environment more efficient and agile than VM …
architecture makes container-based cloud environment more efficient and agile than VM …
Security of cloud FPGAs: A survey
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …