{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:31:52Z","timestamp":1725571912217},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8253984","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:54Z","timestamp":1516038654000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Cache Covert-Channel Mitigation in Cloud Virtualization with XEN's Credit Scheduler"],"prefix":"10.1109","author":[{"given":"Maximilian","family":"Zeiser","sequence":"first","affiliation":[]},{"given":"Johann","family":"Betz","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3134"},{"journal-title":"Credit scheduler","year":"0","author":"faggioli","key":"ref12"},{"key":"ref13","first-page":"687","article-title":"Scheduler-based defenses against cross-vm side-channels","author":"varadarajan","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.283"},{"journal-title":"Implementierung und analyse des c3schedulers","year":"2017","author":"zeiser","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_14"},{"journal-title":"Benchmarking Modern Multiprocessors","year":"2011","author":"bienia","key":"ref17"},{"key":"ref4","first-page":"54","article-title":"C3-sched - a cache covert channel robust cloud computing scheduler","author":"betz","year":"2014","journal-title":"Internet Technology and Secured Transactions"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"},{"key":"ref6","article-title":"Cache missing for fun and profit","author":"percival","year":"2005","journal-title":"Proc BSDCan"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"ref7","first-page":"1","article-title":"Cache attacks and countermeasures: The case of aes","author":"osvik","year":"2006","journal-title":"Proc RSA Conf Topics Cryptol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"ref1","first-page":"719","article-title":"Flush+reload: A high resolution, low noise, 13 cache side-channel attack","author":"yarom","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08253984.pdf?arnumber=8253984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T19:12:50Z","timestamp":1519067570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8253984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8253984","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}