{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:26:32Z","timestamp":1742919992528,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319226347"},{"type":"electronic","value":"9783319226354"}],"license":[{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-22635-4_13","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T14:44:03Z","timestamp":1438613043000},"page":"147-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel"],"prefix":"10.1007","author":[{"given":"M.","family":"Peter","sequence":"first","affiliation":[]},{"given":"M.","family":"Petschick","sequence":"additional","affiliation":[]},{"given":"J.","family":"Vetter","sequence":"additional","affiliation":[]},{"given":"J.","family":"Nordholz","sequence":"additional","affiliation":[]},{"given":"J.","family":"Danisevskis","sequence":"additional","affiliation":[]},{"given":"J.-P.","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"key":"13_CR1","unstructured":"Apt1: Exposing one of China\u2019s cyber espionage units (2013)"},{"key":"13_CR2","unstructured":"Apt28: A window into russia\u2019s cyber espionage operations? (2014)"},{"key":"13_CR3","volume-title":"Computer Security","author":"MA Bishop","year":"2002","unstructured":"Bishop, M.A.: Computer Security. Addison-Wesley Professional, Art and Science (2002)"},{"key":"13_CR4","unstructured":"Clarke, R., Knake, R.: Cyber War: The Next Threat to National Security and What to Do About It. Ecco (2012)"},{"key":"13_CR5","unstructured":"Fiasco.oc website (2014). http:\/\/os.inf.tu-dresden.de\/fiasco\/"},{"key":"13_CR6","unstructured":"Genua cyber-top. https:\/\/www.genua.de\/loesungen\/security-laptop-cyber-top.html"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Karger, P., Zurko, M., Bonin, D., Mason, A., Kahn, C.: A vmm security kernel for the vax architecture. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 2\u201319 (1990)","DOI":"10.1109\/RISP.1990.63834"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: Sel4: formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP \u201909, 207\u2013220, New York, USA (2009). (ACM)","DOI":"10.1145\/1629575.1629596"},{"key":"13_CR9","unstructured":"L4re-based simko 3 security smartphone wins bsi approval for classified data (2013). http:\/\/www.kernkonzept.com"},{"issue":"5","key":"13_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/173668.168633","volume":"27","author":"J Liedtke","year":"1993","unstructured":"Liedtke, J.: Improving ipc by kernel design. SIGOPS Oper. Syst. Rev. 27(5), 175\u2013188 (1993)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"13_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/224057.224075","volume":"29","author":"J Liedtke","year":"1995","unstructured":"Liedtke, J.: On micro-kernel construction. SIGOPS Oper. Syst. Rev. 29(5), 237\u2013250 (1995)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Lin, Y., Ding, L., Wu, J., Xie, Y., Wang, Y.: Robust and efficient covert channel communications in operating systems: design, implementation and evaluation. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 45\u201352 (2013)","DOI":"10.1109\/SERE-C.2013.12"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Lipinski, B., Mazurczyk, W., Szczypiorski, K.: Improving hard disk contention-based covert channel in cloud computing environment. arXiv preprint (2014). arXiv:1402.0239","DOI":"10.1109\/SPW.2014.24"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Okamura, K., Oyama, Y.: Load-based covert channels between xen virtual machines. In: Proceedings of the 2010 ACM Symposium on Applied Computing, SAC \u201910, 173\u2013180, New York, USA (2010). (ACM)","DOI":"10.1145\/1774088.1774125"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS \u201909, 199\u2013212, New York, USA (2009). (ACM)","DOI":"10.1145\/1653662.1653687"},{"key":"13_CR16","unstructured":"Simko\u2013sichere mobile kommunikation (2014). http:\/\/security.t-systems.de\/loesungen\/mobile-simko"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest os. In: Proceedings of the Fourth European Workshop on System Security, EUROSEC \u201911, 1:1\u20131:6, New York, USA (2011). (ACM)","DOI":"10.1145\/1972551.1972552"},{"key":"13_CR18","unstructured":"Technical features - Minnowboard (2014). http:\/\/www.minnowboard.org\/technical-features\/"},{"key":"13_CR19","unstructured":"Technical features\u2013Pandaboard (2014). http:\/\/pandaboard.org\/content\/platform"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Wu, J., Ding, L., Lin, Y., Min-Allah, N., Wang, Y.: Xenpump: a new method to mitigate timing channel in cloud computing. In: Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD), 678\u2013685 (2012)","DOI":"10.1109\/CLOUD.2012.28"},{"key":"13_CR21","unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security\u201912, 9\u20139, Berkeley, USA (2012). (USENIX Association)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Xiao, J., Xu, Z., Huang, H., Wang, H.: Security implications of memory deduplication in a virtualized environment. In: Proceedings of the 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u201312 (2013)","DOI":"10.1109\/DSN.2013.6575349"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., Schlichting, R.: An exploration of l2 cache covert channels in virtualized environments. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW \u201911, 29\u201340, New York, USA (2011). (ACM)","DOI":"10.1145\/2046660.2046670"}],"container-title":["Lecture Notes in Electrical Engineering","Information Sciences and Systems 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22635-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T07:38:20Z","timestamp":1676965100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22635-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,4]]},"ISBN":["9783319226347","9783319226354"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22635-4_13","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015,8,4]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}