{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:45:24Z","timestamp":1751093124174,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030960568"},{"type":"electronic","value":"9783030960575"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96057-5_2","type":"book-chapter","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T05:03:05Z","timestamp":1644382985000},"page":"22-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Threats in\u00a0Cloud Rooted from\u00a0Machine Learning-Based Resource Provisioning Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5088-8728","authenticated-orcid":false,"given":"Hosein Mohammadi","family":"Makrani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6423-0145","authenticated-orcid":false,"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3094-9439","authenticated-orcid":false,"given":"Najmeh","family":"Nazari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8904-4699","authenticated-orcid":false,"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Bazm, M.-M., Lacoste, M., S\u00fcdholt, M., Menaud, J.-M.: Isolation in cloud computing infrastructures: new security challenges. Ann. Telecommun., 197\u2013209 (2019). https:\/\/doi.org\/10.1007\/s12243-019-00703-z","DOI":"10.1007\/s12243-019-00703-z"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1016\/j.asoc.2016.09.014","volume":"49","author":"M Chiappetta","year":"2016","unstructured":"Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. 49, 1162\u20131174 (2016)","journal-title":"Appl. Soft Comput."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Delimitrou, C., Kozyrakis, C.: Quasar: resource-efficient and QoS-aware cluster management. In: ACM SIGARCH Computer Architecture News, vol. 42, pp. 127\u2013144. ACM (2014)","DOI":"10.1145\/2654822.2541941"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Dinakarrao, S.M.P., et al.: Adversarial attack on microarchitectural events based malware detectors. In: DAC (2019)","DOI":"10.1145\/3316781.3317762"},{"key":"2_CR5","unstructured":"Goodfellow, I.J., et al.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"2_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-40576-1_25","volume-title":"Security in Computing and Communications","author":"S Gupta","year":"2013","unstructured":"Gupta, S., Kumar, P.: VM profile based optimized network attack pattern detection scheme for DDOS attacks in cloud. In: Thampi, S.M., Atrey, P.K., Fan, C.-I., Perez, G.M. (eds.) SSCC 2013. CCIS, vol. 377, pp. 255\u2013261. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40576-1_25"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-43283-0_2","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"MS \u0130nci","year":"2016","unstructured":"\u0130nci, M.S., Gulmezoglu, B., Eisenbarth, T., Sunar, B.: Co-location detection on the cloud. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 19\u201334. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43283-0_2"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Khasawneh, K.N., et al.: RHMD: evasion-resilient hardware malware detectors. In: MICRO (2017)","DOI":"10.1145\/3123939.3123972"},{"issue":"4","key":"2_CR9","first-page":"1005","volume":"9","author":"F Liu","year":"2014","unstructured":"Liu, F., Ren, L., Bai, H.: Mitigating cross-VM side channel attack on multiple tenants cloud platform. JCP 9(4), 1005\u20131013 (2014)","journal-title":"JCP"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442696","volume":"5","author":"HM Makrani","year":"2021","unstructured":"Makrani, H.M., et al.: Adaptive performance modeling of data-intensive workloads for resource provisioning in virtualized environment. ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS) 5(4), 1\u201324 (2021)","journal-title":"ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Makrani, H.M., Sayadi, H., Motwani, D., Wang, H., Rafatirad, S., Homayoun, H.: Energy-aware and machine learning-based resource provisioning of in-memory analytics on cloud. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 517\u2013517 (2018)","DOI":"10.1145\/3267809.3275459"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Makrani, H.M., et al.: Cloak & co-locate: adversarial railroading of resource sharing-based attacks on the cloud. In: 2021 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE (2021)","DOI":"10.1109\/SEED51797.2021.00011"},{"key":"2_CR13","unstructured":"Mucci, P.J., Browne, S., Deane, C., Ho, G.: PAPI: a portable interface to hardware performance counters. In: Proceedings of the Department of Defense HPCMP Users Group Conference, vol. 710 (1999)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-30806-7_9","volume-title":"Engineering Secure Software and Systems","author":"M Payer","year":"2016","unstructured":"Payer, M.: HexPADS: a platform to detect \u201cStealth\u2019\u2019 attacks. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 138\u2013154. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_9"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/cryptography5040028","volume":"5","author":"H Sayadi","year":"2021","unstructured":"Sayadi, H., et al.: Towards accurate run-time hardware-assisted stealthy malware detection: a lightweight, yet effective time series CNN-based approach. Cryptography 5(4), 28 (2021)","journal-title":"Cryptography"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Sayadi, H., et al.: Recent advancements in microarchitectural security: review of machine learning countermeasures. In: 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 949\u2013952. IEEE (2020)","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., Swift, M.M.: Resource-freeing attacks: improve your cloud performance (at your neighbor\u2019s expense). In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 281\u2013292. ACM (2012)","DOI":"10.1145\/2382196.2382228"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., Mohsenin, T., Homayoun, H.: Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks. In: Proceedings of the 2020 on Great Lakes Symposium on VLSI, pp. 181\u2013186 (2020)","DOI":"10.1145\/3386263.3407586"},{"key":"2_CR19","unstructured":"Xu, Z., Wang, H., Wu, Z.: A measurement study on co-residence threat inside the cloud. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 929\u2013944 (2015)"},{"key":"2_CR20","unstructured":"Yadwadkar, N., et al.: Selecting the best VM across multiple public clouds: a data-driven performance modeling approach. In: ACM SoCC (2017)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-50011-9_28","volume-title":"Information and Communications Security","author":"W Zhang","year":"2016","unstructured":"Zhang, W., et al.: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 361\u2013375. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50011-9_28"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 305\u2013316. ACM (2012)","DOI":"10.1145\/2382196.2382230"}],"container-title":["Communications in Computer and Information Science","Silicon Valley Cybersecurity Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96057-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T05:04:21Z","timestamp":1644383061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96057-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030960568","9783030960575"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96057-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SVCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Silicon Valley Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Jose, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"svcc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/svcc2021.svcsi.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}