{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:59:26Z","timestamp":1755838766744},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_27","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"491-511","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling"],"prefix":"10.1007","author":[{"given":"Li","family":"Liu","sequence":"first","affiliation":[]},{"given":"An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"WanYu","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Menbai","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"27_CR1","unstructured":"Credit Scheduler (2017). \nhttp:\/\/wiki.xen.org\/wiki\/Credit_Scheduler\n\n. Accessed 19 Feb 2018"},{"key":"27_CR2","unstructured":"Amazon EC2 Dedicated Hosts (2018). \nhttps:\/\/aws.amazon.com\/ec2\/dedicated-hosts\/\n\n. Accessed 19 Feb 2018"},{"key":"27_CR3","unstructured":"Amazon EC2 Instance Types (2018). \nhttps:\/\/aws.amazon.com\/ec2\/instance-types\/\n\n. Accessed 19 Feb 2018"},{"key":"27_CR4","unstructured":"Overcommitting CPU and RAM (2018). \nhttps:\/\/docs.openstack.org\/arch-design\/design-compute\/design-compute-overcommit.html\n\n. Accessed 19 Feb 2018"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Askarov, A., Zhang, D., Myers, A.C.: Predictive black-box mitigation of timing channels. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 297\u2013307. ACM (2010)","DOI":"10.1145\/1866307.1866341"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Cortez, E., Bonde, A., Muzio, A., Russinovich, M., Fontoura, M., Bianchini, R.: Resource central: understanding and predicting workloads for improved resource management in large cloud platforms. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 153\u2013167. ACM (2017)","DOI":"10.1145\/3132747.3132772"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-016-0141-6","volume":"8","author":"Q Ge","year":"2016","unstructured":"Ge, Q., Yarom, Y., Cock, D., Heiser, G.: A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8, 1\u201327 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Ghosh, R., Naik, V.K.: Biting off safely more than you can chew: predictive analytics for resource over-commit in IaaS cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 25\u201332. IEEE (2012)","DOI":"10.1109\/CLOUD.2012.131"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Godfrey, M., Zulkernine, M.: A server-side solution to cache-based side-channel attacks in the cloud. In: 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD), pp. 163\u2013170. IEEE (2013)","DOI":"10.1109\/CLOUD.2013.21"},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s13389-012-0031-5","volume":"2","author":"S Gueron","year":"2012","unstructured":"Gueron, S.: Efficient software implementations of modular exponentiation. J. Cryptogr. Eng. 2(1), 31\u201343 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games - bringing access-based cache attacks on AES to practice. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 2011, pp. 490\u2013505. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/SP.2011.22"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03356-8_1","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N Heninger","year":"2009","unstructured":"Heninger, N., Shacham, H.: Reconstructing RSA private keys from random key bits. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 1\u201317. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03356-8_1"},{"key":"27_CR13","unstructured":"Holenstein, T., Mitzenmacher, M., Panigrahy, R., Wieder, U.: Trace reconstruction with constant deletion probability and related results. In: Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 389\u2013398. Society for Industrial and Applied Mathematics (2008)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Hu, W.M.: Lattice scheduling and covert channels. In: Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 52\u201361. IEEE (1992)","DOI":"10.1109\/RISP.1992.213271"},{"key":"27_CR15","unstructured":"Inci, M.S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., Sunar, B.: Seriously, get off my cloud! cross-VM RSA key recovery in a public cloud. Technical report, IACR Cryptology ePrint Archive (2015)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar, B.: Cross processor cache attacks. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 353\u2013364. ACM (2016)","DOI":"10.1145\/2897845.2897867"},{"key":"27_CR17","unstructured":"Kim, T., Peinado, M., Mainar-Ruiz, G.: STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 11. USENIX Association, Berkeley (2012)"},{"key":"27_CR18","unstructured":"Kopytov, A.: Sysbench: a system performance benchmark (2004). \nhttp:\/\/sysbench.sourceforge.net"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Liu, F., et al.: Catalyst: defeating last-level cache side channel attacks in cloud computing. In: 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 406\u2013418. IEEE (2016)","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: IEEE Symposium on Security and Privacy, San Jose, CA, US (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, A., Zang, W., Yu, M., Chen, S.: Empirical evaluation of the hypervisor scheduling on side channel attacks. In: 2018 IEEE International Conference on Communications (ICC). IEEE (2018)","DOI":"10.1109\/ICC.2018.8422722"},{"key":"27_CR22","unstructured":"Lowe, S.D.: Best practices for oversubscription of CPU, memory and storage in vSphere virtual environments. Technical Whitepaper, Dell (2013)"},{"key":"27_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/978-3-662-44777-2_57","volume-title":"Algorithms - ESA 2014","author":"A McGregor","year":"2014","unstructured":"McGregor, A., Price, E., Vorotnikova, S.: Trace reconstruction revisited. In: Schulz, A.S., Wagner, D. (eds.) ESA 2014. LNCS, vol. 8737, pp. 689\u2013700. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44777-2_57"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1214\/08-PS141","volume":"6","author":"M Mitzenmacher","year":"2009","unstructured":"Mitzenmacher, M., et al.: A survey of results for deletion channels and related synchronization channels. Probab. Surv. 6, 1\u201333 (2009)","journal-title":"Probab. Surv."},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Moon, S.J., Sekar, V., Reiter, M.K.: Nomad: mitigating arbitrary cloud side channels via provider-assisted migration. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1595\u20131606. ACM (2015)","DOI":"10.1145\/2810103.2813706"},{"key":"27_CR26","unstructured":"Pessl, P., Gruss, D., Maurice, C., Schwarz, M., Mangard, S.: Drama: exploiting dram addressing for cross-CPU attacks. In: 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016, pp. 565\u2013581. USENIX Association (2016)"},{"key":"27_CR27","unstructured":"Rane, A., Lin, C., Tiwari, M.: Raccoon: closing digital side-channels through obfuscated execution. In: USENIX Security, pp. 431\u2013446 (2015)"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199\u2013212. ACM (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"27_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-60876-1_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Schwarz","year":"2017","unstructured":"Schwarz, M., Weiser, S., Gruss, D., Maurice, C., Mangard, S.: Malware guard extension: using SGX to conceal cache attacks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 3\u201324. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60876-1_1"},{"key":"27_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1007\/978-3-642-40203-6_40","volume-title":"Computer Security \u2013 ESORICS 2013","author":"D Stefan","year":"2013","unstructured":"Stefan, D., et al.: Eliminating cache-based timing attacks with instruction-based scheduling. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 718\u2013735. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40203-6_40"},{"key":"27_CR31","unstructured":"Varadarajan, V., Ristenpart, T., Swift, M.: Scheduler-based defenses against cross-VM side-channels. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 687\u2013702. USENIX Association, San Diego (2014)"},{"key":"27_CR32","unstructured":"Varadarajan, V., Zhang, Y., Ristenpart, T., Swift, M.M.: A placement vulnerability study in multi-tenant public clouds. In: USENIX Security, pp. 913\u2013928 (2015)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Vateva-Gurova, T., Suri, N., Mendelson, A.: The impact of hypervisor scheduling on compromising virtualized environments. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), pp. 1910\u20131917. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.283"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Vattikonda, B.C., Das, S., Shacham, H.: Eliminating fine grained timers in Xen. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW 2011, pp. 41\u201346. ACM, New York (2011)","DOI":"10.1145\/2046660.2046671"},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, F., Chen, S.: Towards cost-effective moving target defense against DDoS and covert channel attacks. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 15\u201325. ACM (2016)","DOI":"10.1145\/2995272.2995281"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ferraiuolo, A., Suh, G.E.: Timing channel protection for a shared memory controller. In: 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA), pp. 225\u2013236. IEEE (2014)","DOI":"10.1109\/HPCA.2014.6835934"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Wang, Y., Suh, G.E.: Efficient timing channel protection for on-chip networks. In: 2012 Sixth IEEE\/ACM International Symposium on Networks on Chip (NoCS), pp. 142\u2013151. IEEE (2012)","DOI":"10.1109\/NOCS.2012.24"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. In: Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA 2007, pp. 494\u2013505. ACM, New York (2007)","DOI":"10.1145\/1250662.1250723"},{"key":"27_CR39","unstructured":"Xu, Z., Wang, H., Wu, Z.: A measurement study on co-residence threat inside the cloud. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 929\u2013944. USENIX Association, Washington, D.C., August 2015"},{"key":"27_CR40","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 719\u2013732. USENIX Association, San Diego (2014)"},{"issue":"2","key":"27_CR41","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s13389-017-0152-y","volume":"7","author":"Y Yarom","year":"2017","unstructured":"Yarom, Y., Genkin, D., Heninger, N.: Cachebleed: a timing attack on openssl constant-time rsa. J. Cryptogr. Eng. 7(2), 99\u2013112 (2017)","journal-title":"J. Cryptogr. Eng."},{"issue":"8","key":"27_CR42","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1109\/TPDS.2014.2346504","volume":"26","author":"R Zhang","year":"2015","unstructured":"Zhang, R., Su, X., Wang, J., Wang, C., Liu, W., Lau, R.W.: On mitigating the risk of cross-vm covert channels in a public cloud. IEEE Trans. Parallel Distrib. Syst. 26(8), 2327\u20132339 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"27_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 305\u2013316. ACM, New York (2012)","DOI":"10.1145\/2382196.2382230"},{"key":"27_CR44","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Reiter, M.K., Zhang, Y.: A software approach to defeating side channels in last-level caches. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 871\u2013882. ACM (2016)","DOI":"10.1145\/2976749.2978324"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:16:20Z","timestamp":1545999380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}