[1] |
LUO Junzhou, JIN Jiahui, SONG Aibo, et al. Cloud Computing: Architecture and Key Technologies[J]. Journal on Communications, 2011. 32(7):3-21.
|
|
罗军舟, 金嘉晖, 宋爱波, 等. 云计算:体系架构与关键技术[J]. 通信学报, 2011,32(7):3-21.
|
[2] |
RISTENPART T, TROMER E, SHACHAM H, et al. Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds[C]// ACM. ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL, USA. New York: ACM, 2009: 199-212.
|
[3] |
LIANG Xin, GUI Xiaolin, DAI Huijun, et al. Cross VM Cache Side Channel Attacks in Cloud:A Survey[J]. Chinese Journal of Computers, 2017,40(2):317-336.
|
|
梁鑫, 桂小林, 戴慧珺, 等. 云环境中跨虚拟机的Cache侧信道攻击技术研究[J]. 计算机学报, 2017,40(2):317-336.
|
[4] |
ZHANG Yinqian, JUEKS A, REITER M K, et al. Cross-VM Side Channels and Their Use to Extract Private Keys[C]// ACM. ACM Conference on Computer and Communications Security, October 16-18, 2012, Raleigh, NC, USA. New York: ACM, 2012: 305-316.
|
[5] |
HAN Yi, JEFFREY C, ALPCAN T, et al. Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(1):95-108.
|
[6] |
MOHAMED M S E, BULYGIN S, ZOHNER M, et al. Improved Algebraic Side-Channel Attack on AES[J]. Journal of Cryptographic Engineering, 2013,3(3):139-156.
|
[7] |
YAO Jianbo, ZHANG Tao. Safe and Effective Elliptic Encryption Algorithm Resistance against Side-Channel Attack[J]. Application Research of Computers, 2019,29(12):4639-4643.
|
|
姚剑波, 张涛. 抗侧信道攻击的安全有效椭圆加密算法[J]. 计算机应用研究, 2012,29(12):4639-4643.
|
[8] |
LIU Weijie. Attack, Detection and Defense of Cross Virtual Machine Side Channel in Cloud Computing Environment[D]. Wuhan: WUHAN University, 2018.
|
|
刘维杰. 云计算环境下跨虚拟机侧信道的攻击、检测与防御[D]. 武汉:武汉大学, 2018.
|
[9] |
PENG Shuanghe, TUERGONG Maitisabier, JIN Fu. Research on Xen Virtual Machine Scheduling Strategy to Mitigate Covert Side Attacks[J]. Engineering Journal of Wuhan University, 2018,51(4):371-376.
|
|
彭双和, 图尔贡·麦提萨比尔, 金傳, 针对减弱隐蔽信道攻击的Xen虚拟机调度策略[J]. 武汉大学学报(工学版), 2018,51(4):371-376.
|
[10] |
XING Chaochao. Research on System Level Defense Method of Cache Side Channel Based on vcpu Scheduling[D]. Hefei: University of Science and Technology of China, 2019.
|
|
邢超超. 基于vCPU调度的Cache侧信道系统级防御方法研究[D]. 合肥:中国科学技术大学, 2019.
|
[11] |
XU Zhang, WANG Haining, WU Zhenyu. A Measurement Study on Co-residence Threat inside the Cloud[C]// USENIX. USENIX Security Symposium, August 12-14, 2015, Washington, DC, USA. Berkley: USENIX Association, 2015: 929-944.
|
[12] |
MOONS, SEKAR V, REITER M K. Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration[C]// ACM. ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, Denver, CO, USA. New York: ACM, 2015: 1595-1606.
|
[13] |
ZHAO Shuo, JI Xinsheng, MAO Yuxing, et al. Research on Dynamic Migration of Virtual Machine Based on Security Level[J]. Journal on Communications, 2017,38(7):165-174.
|
|
赵硕, 季新生, 毛宇星, 等. 基于安全等级的虚拟机动态迁移方法[J]. 通信学报, 2017,38(7):165-174.
|
[14] |
HUANG Kaizhi, PAN Qirun, YUAN Quan, et al. A Virtual Node Migration Method for Sensing Side-channel Risk[J]. Journal of Electronics & Information Technology, 2019,41(9):2164-2171.
|
|
黄开枝, 潘启润, 袁泉, 等. 一种侧信道风险感知的虚拟节点迁移方法[J]. 电子与信息学报, 2019,41(9):2164-2171.
|
[15] |
LIANG Xin, GUI Xiaolin, JIANA. N, et al. Mitigating Cloud Co-Resident Attacks via grouping-Based Virtual Machine Placement Strategy[C]// IEEE. IEEE International Performance Computing and Communications Conference, December 10-12, 2017, San Diego, CA, USA. New York: IEEE, 2017: 1-8.
|
[16] |
ZHANG Miao, JI Xinsheng, LIU Wenyan, et al. Research on Active Defense Against Co-Resident Attack Based on Dynamic Placement Strategies[J]. Journal of Information Engineering University, 2018,19(3):257-263.
|
|
张淼, 季新生, 刘文彦, 等. 基于放置策略动态化的共存攻击主动防御方法[J]. 信息工程大学学报, 2018,19(3):257-263.
|
[17] |
VARADARA J, ZHANG Yinqian, RISTEN P, et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds[C]// USENIX. USENIX Security Symposium, August 12-14, 2015, Washington, DC, USA. Berkley: USENIX Association, 2015: 913-928.
|
[18] |
LUO Yang, SHEN Qingni, LI Cong, et al. Probing the Scheduling Algorithms in the Cloud Based on Openstack[C]// Springer. International Conference on Cloud Computing and Security, August 13-15,Nanjing, China.Berlin: Springer, 2015: 510-520.
|
[19] |
OUSMANE S B, MBACKE B C S, IBRAHIMA N. A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing[C]// ACM. International Conference on Networking, March 27-19, 2019, Rabat, Morocco. New York: ACM, 2019: 1-8.
|
[20] |
BELOGLAZOV A, BUYYA R. Energy Efficient Resource Management in Virtualized Cloud Data Centers[C]// IEEE. IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, May 17-20, 2010, Melbourne, VIC, Australia. New York: IEEE, 2010: 826-831.
|