{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:42:18Z","timestamp":1725601338617},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422722","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T18:51:41Z","timestamp":1534791101000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks"],"prefix":"10.1109","author":[{"given":"Li","family":"Liu","sequence":"first","affiliation":[]},{"given":"An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"WanYu","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SysBench","year":"0","key":"ref30"},{"key":"ref10","first-page":"929","article-title":"A measurement study on co-residence threat inside the cloud","author":"xu","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15) Washington D C USENIX Association"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/978-3-642-30436-1_32","article-title":"Incentive compatible moving target defense against vm-colocation attacks in clouds","author":"zhang","year":"2012","journal-title":"in Information Security and Privacy Research ser IFIP Advances in Information and Communication Technology"},{"key":"ref12","first-page":"382","author":"ferraiuolo","year":"2016","journal-title":"Lattice priority scheduling Low-overhead timing-channel protection for a shared memory controller"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2009.4798277"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516741"},{"key":"ref16","first-page":"687","article-title":"Scheduler-based defenses against cross-vm side-channels","author":"varadarajan","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref17","article-title":"Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud","author":"inci","year":"2015","journal-title":"IACR Cryptology ePrint Archive Report"},{"key":"ref18","first-page":"75","article-title":"ooh aah&#x2026; just a little bit&#x201D;: A small amount of side channel can go a long way","author":"benger","year":"2014","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref19","first-page":"897","article-title":"Cache template attacks: Automating attacks on inclusive last-level caches","author":"gruss","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15) Washington D C USENIX Association"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"ref4","first-page":"719","article-title":"Flush+reload: A high resolution, low noise, 13 cache side-channel attack","author":"yarom","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"journal-title":"Cache missing for fun and profit","year":"2005","author":"percival","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"journal-title":"Amazon EC2 dedicated hosts","year":"0","key":"ref6"},{"journal-title":"Credit scheduler","year":"0","key":"ref29"},{"key":"ref5","first-page":"565","article-title":"Drama: Exploiting dram addressing for cross-cpu attacks","author":"pessl","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)(Austin TX 2016) USENIX Association"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813706"},{"key":"ref7","first-page":"9","article-title":"Co-location-resistant clouds","author":"azar","year":"2014","journal-title":"Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security ser CCSW &#x2018;14"},{"key":"ref2","first-page":"11","article-title":"Stealthmem: System-level protection against cache-based side channel attacks in the cloud","author":"kim","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium Ser Security'12"},{"key":"ref9","first-page":"913","article-title":"A placement vulnerability study in multi-tenant public clouds","author":"varadarajan","year":"2015","journal-title":"Usenix Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23264"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.42"},{"key":"ref22","first-page":"3","article-title":"Just a little bit more","author":"van de pol","year":"2015","journal-title":"The Cryptographers Track at the RSA Conference"},{"key":"ref21","first-page":"699","article-title":"Wait a minute! a fast, cross-vm attack on aes","author":"irazoqui","year":"2014","journal-title":"Research in Attacks Intrusions and Defenses ser Lecture Notes in Computer Science"},{"key":"ref24","first-page":"80","article-title":"Cheap hardware parallelism implies cheap security","author":"acii\u00e7mez","year":"2007","journal-title":"Fault Diagnosis and Tolerance in Cryptography 2007 FDTC 2007 Workshop On IEEE"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref26","first-page":"1","article-title":"Cache attacks and countermeasures: The case of aes","author":"osvik","year":"2006","journal-title":"Topics in Cryptology - CT-RSA 2006 ser Lecture Notes in Computer Science"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1229285.1266999","article-title":"On the power of simple branch prediction analysis","author":"acii\u00e7mez","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422722.pdf?arnumber=8422722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T17:41:45Z","timestamp":1661794905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422722","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}