{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:04Z","timestamp":1742913184287,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_29","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"313-323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CDT to Detect Co-residence in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Hicham","family":"Boukhriss","sequence":"first","affiliation":[]},{"given":"Mustapha","family":"Hedabou","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Boutkhoum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"29_CR1","unstructured":"AbdelSalam, A.M., Elkilani, W.S., Amin, K.M.: An automated approach for preventing ARP spoofing attack using static ARP entries. (JACSA) Int. J. Adv. Comput. Sci. Appl. 5(1) (2004)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Srinath, D., Panimalar, S., JerrinSimla, A., Deepa, J.: Detection and prevention ofARP spoofing using centralized server. Int. J. Comput. Appl. 113(19) (2015). (0975 \u20138887)","DOI":"10.5120\/19935-1931"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Boukhriss, H., Mohammed, A.A., Hedabou, M.: New technique of localization a targeted virtual machine in a cloud platform. In: Proceedings 5th Workshop on Codes, Cryptography and Communication Systems, WCCCS 2014 (2014)","DOI":"10.1109\/WCCCS.2014.7107907"},{"key":"29_CR4","unstructured":"Upton, D.: Detection and subversion of virtual machines. University of Virginia, CS 851 - Virtual Machine (2006)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Cunningham, R.: Honeypot-aware advanced botnet construction and maintenance. In: International Conference on Dependable Systems and Networks DSN 2006 (2006)","DOI":"10.1109\/DSN.2006.38"},{"key":"29_CR6","unstructured":"Wang, P., Wu, L., Cunningham, R., Zou, C.C.: Honeypot detection in advanced botnet attacks. Int. J. Inf. Comput. Secur. 4(1), 30\u201351 (2010)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Del Pozo, S.M., Standaert, F.X., Kamel, D., Moradi, A.: Side-channel attacks from static power: when should we care? In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, pp. 145\u2013150 (2015)","DOI":"10.7873\/DATE.2015.0712"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, F.F., Goel, M., Desnoyers, P., Sundaram, R.: Scheduler vulnerabilities and coordinated attacks in cloud computing. In: Proceedings of Tenth IEEE International Symposium on Network Computing and Applications (NCA 2011), pp. 123\u2013130 (2011)","DOI":"10.1109\/NCA.2011.24"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., Swift, M.: Resource-freeing attacks: improve your cloud performance (at Your Neighbors Expense). In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2012), pp. 281\u2013292 (2012)","DOI":"10.1145\/2382196.2382228"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Z., Fang, H., Wu, Y., Li, C., Zhao, B., Huang, H.H.: Understanding the effects of hypervisor I\/O scheduling for virtual machine performance interference. In: Proceedings of Fourth IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012), pp. 34\u201341 (2012)","DOI":"10.1109\/CloudCom.2012.6427495"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Bedi, H., Shiva, S.: Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. In:Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI 2012), pp. 463\u2013469 (2012)","DOI":"10.1145\/2345396.2345473"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing. In: Proceedings of the Workshop on Security in Cloud Computing (SCC). Princeton University, Princeton, NJ, USA (2013)","DOI":"10.1145\/2484402.2484406"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, M., Figueiredo, R.J.: Experimental study of virtual machine migration in support of reservation of cluster resources. In: Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing Article No. 5. Reno, Nevada (2007)","DOI":"10.1145\/1408654.1408659"},{"key":"29_CR14","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2, pp. 273\u2013286, (02\u201304 May 2005)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Ye, K., Jiang, X., Ma, R.: VC-migration: live migration of virtual clusters in the cloud grid computing (GRID). In: ACM\/IEEE 13th International Conference (2012)","DOI":"10.1109\/Grid.2012.27"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. ACM \u200e(2009)","DOI":"10.1145\/1653662.1653687"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Oprea, A., Juels, A., Reiter, M.K.: HomeAlone: co-residency detection in the cloud via side-channel analysis. In: IEEE Symposium on Security and Privacy (SP) (2011)","DOI":"10.1109\/SP.2011.31"},{"key":"29_CR18","unstructured":"Si, Y., Xiaolin, G., Jiancai, L., Xuejun, Z., Junfei, W.: Detecting VMs co-residency in the cloud: using cache-based side channels attacks. Elektronika Ir Elektrotechnika 19(5), 73\u201378 (2013). ISSN 1392-1215"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Xu, Y., Bailey, M., Kaustubh, Joshi, F.J.K., Hiltunen, M., Schlichting, R.: .An exploration of L2 cache covert channels in virtualized environments. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW 2011, pp. 29\u201340 (2011)","DOI":"10.1145\/2046660.2046670"},{"key":"29_CR20","unstructured":"Sevak, B.: Security against side channel attack in cloud computing. Int. J. Eng. Adv. Technol. (IJEAT). 2(2), p. 183 (2012). ISSN: 2249 \u2013 8958"},{"key":"29_CR21","unstructured":"Microsoft Azure: Cloud Computing Platform & Services. https:\/\/azure.microsoft.com\/fr-fr\/"},{"key":"29_CR22","unstructured":"Amazon Web Services (AWS) - Cloud Computing Services. https:\/\/aws.amazon.com\/fr\/"},{"key":"29_CR23","unstructured":"Compute Engine - IaaS \u2013 Google Cloud Platform. https:\/\/cloud.google.com\/compute\/"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T00:23:44Z","timestamp":1570926224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]}}}