{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:38:39Z","timestamp":1766486319788,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319432823"},{"type":"electronic","value":"9783319432830"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-43283-0_2","type":"book-chapter","created":{"date-parts":[[2016,7,22]],"date-time":"2016-07-22T09:41:28Z","timestamp":1469180488000},"page":"19-34","source":"Crossref","is-referenced-by-count":28,"title":["Co-location Detection on the Cloud"],"prefix":"10.1007","author":[{"given":"Mehmet Sinan","family":"\u0130nci","sequence":"first","affiliation":[]},{"given":"Berk","family":"Gulmezoglu","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,23]]},"reference":[{"key":"2_CR1","unstructured":"AWS IP Address Ranges. http:\/\/docs.aws.amazon.com\/general\/latest\/gr\/aws-ip-ranges.html"},{"key":"2_CR2","unstructured":"Microsoft Azure Sizes for virtual machines. https:\/\/azure.microsoft.com\/en-us\/documentation\/articles\/virtual-machines-size-specs\/"},{"key":"2_CR3","unstructured":"The OpenMP API specification for parallel programming"},{"key":"2_CR4","unstructured":"Amazon EC2 Instances (2016). http:\/\/aws.amazon.com\/ec2\/instance-types\/"},{"key":"2_CR5","unstructured":"Google Compute Engine Instance Types (2016). https:\/\/cloud.google.com\/compute\/docs\/machine-types"},{"issue":"2","key":"2_CR6","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s10207-013-0210-0","volume":"13","author":"A Bates","year":"2014","unstructured":"Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., Butler, K.: On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Secur. 13(2), 171\u2013189 (2014). http:\/\/dx.doi.org\/10.1007\/s10207-013-0210-0","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-662-44709-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"N Benger","year":"2014","unstructured":"Benger, N., van de Pol, J., Smart, N.P., Yarom, Y.: \u201cOoh Aah.. Just a Little Bit\u201d: a small amount of side channel can go a long way. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 75\u201392. Springer, Heidelberg (2014)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Fardan, N.J.A., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: Security and Privacy, pp. 526\u2013540 (2013)","DOI":"10.1109\/SP.2013.42"},{"key":"2_CR9","unstructured":"Gaudin, S.: Public cloud market ready for \u2018hypergrowth\u2019 period. Computerworld Article, April 2014. http:\/\/www.computerworld.com\/article\/2488572\/cloud-computing\/public-cloud-market-ready-for-hypergrowth-period.html"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"G\u00fclmezoglu, B., \u0130nci, M.S., Apecechea, G.I., Eisenbarth, T., Sunar, B.: A faster and more realistic flush+reload attack on AES. In: COSADE, pp. 111\u2013126 (2015)","DOI":"10.1007\/978-3-319-21476-4_8"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Hund, R., Willems, C., Holz, T.: Practical timing side channel attacks against kernel space ASLR. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, pp. 191\u2013205 (2013). http:\/\/dx.doi.org\/10.1109\/SP.2013.23","DOI":"10.1109\/SP.2013.23"},{"key":"2_CR12","unstructured":"\u0130nci, M.S., Gulmezoglu, B., Irazoqui, G., Eisenbarth, T., Sunar, B.: Seriously, get off my cloud! Cross-VM RSA key recovery in a public cloud. Technical report. http:\/\/eprint.iacr.org\/"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., \u0130nci, M.S., Eisenbarth, T., Sunar, B.: Fine grain Cross-VM attacks on Xen and VMware. In: 2014 IEEE Fourth International Conference on Big Data and Cloud Computing (BdCloud), pp. 737\u2013744, December 2014","DOI":"10.1109\/BDCloud.2014.102"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., Eisenbarth, T., Sunar, B.: S$A: a shared cache attack that works across cores and defies VM sandboxing? And its application to AES. In: IEEE S&P (2015)","DOI":"10.1109\/SP.2015.42"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., \u0130nci, M.S., Eisenbarth, T., Sunar, B.: Know thy neighbor: crypto library detection in cloud. In: Proceedings on Privacy Enhancing Technologies, vol. 1, no. 1, pp. 25\u201340 (2015)","DOI":"10.1515\/popets-2015-0003"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Irazoqui, G., \u0130nci, M.S., Eisenbarth, T., Sunar, B.: Lucky 13 Strikes Back. In: ASIA CCS 2015, pp. 85\u201396 (2015)","DOI":"10.1145\/2714576.2714625"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: IEEE S&P, pp. 605\u2013622 (2015)","DOI":"10.1109\/SP.2015.43"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS 2009, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: Proceedings of the Fourth European Workshop on System Security, p. 1. ACM (2011)","DOI":"10.1145\/1972551.1972552"},{"key":"2_CR20","unstructured":"Varadarajan, V., Zhang, Y., Ristenpart, T., Swift, M.: A placement vulnerability study in multi-tenant public clouds. In: 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., pp. 913\u2013928 (2015)"},{"key":"2_CR21","unstructured":"Xu, Z., Wang, H., Wu, Z.: A measurement study on co-residence threat inside the cloud. In: 24th USENIX Security, pp. 929\u2013944 (2015)"},{"key":"2_CR22","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: USENIX Security 2014, pp. 719\u2013732 (2014)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Oprea, A., Reiter, M.K.: HomeAlone: co-residency detection in the cloud via side-channel analysis. In: IEEE S&P (2011)","DOI":"10.1109\/SP.2011.31"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: CCS 2012, pp. 305\u2013316 (2012)","DOI":"10.1145\/2382196.2382230"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-tenant side-channel attacks in PaaS clouds. In: CCS, pp. 990\u20131003 (2014)","DOI":"10.1145\/2660267.2660356"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-43283-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T12:22:00Z","timestamp":1568204520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-43283-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319432823","9783319432830"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-43283-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}