{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:55Z","timestamp":1774448995651,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T00:00:00Z","timestamp":1319155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,21]]},"DOI":"10.1145\/2046660.2046670","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":180,"title":["An exploration of L2 cache covert channels in virtualized environments"],"prefix":"10.1145","author":[{"given":"Yunjing","family":"Xu","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Farnam","family":"Jahanian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Kaustubh","family":"Joshi","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]},{"given":"Matti","family":"Hiltunen","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]},{"given":"Richard","family":"Schlichting","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Department of Defense.","author":"Trusted","year":"1985","unstructured":"Trusted computing system evaluation. \"the orange book\". dod 5200.28-std, U.S . Department of Defense. , Washington , 1985 . Trusted computing system evaluation. \"the orange book\". dod 5200.28-std, U.S. Department of Defense., Washington, 1985."},{"key":"e_1_3_2_1_2_1","volume-title":"Ip checksum covert channels and selected hash collision. Technical report","author":"Abad C.","year":"2010","unstructured":"Abad , C. Ip checksum covert channels and selected hash collision. Technical report , 2010 . Abad, C. Ip checksum covert channels and selected hash collision. Technical report, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 9th workshop on Multimedia & Security, (MM&Sec'02)","author":"Ahsan K.","year":"2002","unstructured":"Ahsan , K. , and Kundur , D . Practical data hiding in tcp\/ip . In Proceedings of the 9th workshop on Multimedia & Security, (MM&Sec'02) (Dallas, TX, USA, September 2002 ). Ahsan, K., and Kundur, D. Practical data hiding in tcp\/ip. In Proceedings of the 9th workshop on Multimedia & Security, (MM&Sec'02) (Dallas, TX, USA, September 2002)."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. Amazon elastic compute cloud (ec2). http:\/\/aws.amazon.com\/ec2\/.  Amazon. Amazon elastic compute cloud (ec2). http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_8_1","volume-title":"A magnetic tape database for a real-time medical information system. Computers in Biology and Medicine 5 (September","author":"Bowdena K.","year":"1975","unstructured":"Bowdena , K. , MacCalluma , I. , and Patience , S . A magnetic tape database for a real-time medical information system. Computers in Biology and Medicine 5 (September 1975 ). Bowdena, K., MacCalluma, I., and Patience, S. A magnetic tape database for a real-time medical information system. Computers in Biology and Medicine 5 (September 1975)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582443"},{"key":"e_1_3_2_1_12_1","unstructured":"cloudbook: The Cloud Computing & SaaS Information Resource. Governemnt Cloud Computing Platforms. http:\/\/www.cloudbook.net\/directories\/gov-clouds\/government-cloud-computing.php 2011.  cloudbook: The Cloud Computing & SaaS Information Resource. Governemnt Cloud Computing Platforms. http:\/\/www.cloudbook.net\/directories\/gov-clouds\/government-cloud-computing.php 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900030"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS'09)","author":"Dean J.","year":"2009","unstructured":"Dean , J. Designs, lessons and advice from building large distributed systems . In Proceedings of the 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS'09) (Big Sky, MT, USA , October 2009 ). Keynote speech. Dean, J. Designs, lessons and advice from building large distributed systems. In Proceedings of the 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS'09) (Big Sky, MT, USA, October 2009). Keynote speech."},{"key":"e_1_3_2_1_16_1","volume-title":"July","author":"Digital Forensics Association","year":"2010","unstructured":"Digital Forensics Association . The Leaking Vault Five Years of Data Breaches , July 2010 . Digital Forensics Association. The Leaking Vault Five Years of Data Breaches, July 2010."},{"key":"e_1_3_2_1_17_1","unstructured":"EC2 A. Summary of the amazon ec2 and amazon rds service disruption in the us east region. http:\/\/aws.amazon.com\/message\/65648\/.  EC2 A. Summary of the amazon ec2 and amazon rds service disruption in the us east region. http:\/\/aws.amazon.com\/message\/65648\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Gartner Inc. Gartner Says Worldwide Cloud Services Market to Surpass $68 Billion in 2010. http:\/\/www.gartner.com\/it\/page.jsp?id=1389313 June 2010.  Gartner Inc. Gartner Says Worldwide Cloud Services Market to Surpass $68 Billion in 2010. http:\/\/www.gartner.com\/it\/page.jsp?id=1389313 June 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02)","author":"Giffin J.","year":"2002","unstructured":"Giffin , J. , Greenstadt , R. , Litwack , P. , and Tibbetts , R . Covert messaging through tcp timestamps . In Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02) (San Francisco, CA, USA , April 2002 ). Giffin, J., Greenstadt, R., Litwack, P., and Tibbetts, R. Covert messaging through tcp timestamps. In Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02) (San Francisco, CA, USA, April 2002)."},{"key":"e_1_3_2_1_21_1","unstructured":"Hammond E. Matching ec2 availability zones across aws accounts. http:\/\/http:\/\/alestic.com\/2009\/07\/\\ ec2-availability-zones.  Hammond E. Matching ec2 availability zones across aws accounts. http:\/\/http:\/\/alestic.com\/2009\/07\/\\ ec2-availability-zones."},{"key":"e_1_3_2_1_22_1","volume-title":"RFC 793: Transmission control protocol","author":"Institute","year":"1981","unstructured":"Institute , I. S. RFC 793: Transmission control protocol , 1981 . http:\/\/www.ietf.org\/rfc\/rfc793.txt. Institute, I. S. RFC 793: Transmission control protocol, 1981. http:\/\/www.ietf.org\/rfc\/rfc793.txt."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.45"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816010"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774125"},{"key":"e_1_3_2_1_28_1","unstructured":"OW2. Rubis. http:\/\/rubis.ow2.org\/.  OW2. Rubis. http:\/\/rubis.ow2.org\/."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of BSDCan 2005","author":"Percival C.","year":"2005","unstructured":"Percival , C. Cache missing for fun and profit . In Proceedings of BSDCan 2005 ( Ottawa, Canada , May 2005 ). Percival, C. Cache missing for fun and profit. In Proceedings of BSDCan 2005 (Ottawa, Canada, May 2005)."},{"key":"e_1_3_2_1_30_1","unstructured":"Rackspace. Rackspace cloud hosting. http:\/\/www.rackspacecloud.com\/.  Rackspace. Rackspace cloud hosting. http:\/\/www.rackspacecloud.com\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278485"},{"key":"e_1_3_2_1_33_1","unstructured":"Wiki. Magnetic stripe card. http:\/\/en.wikipedia.org\/wiki\/Magnetic_stripe_card.  Wiki. Magnetic stripe card. http:\/\/en.wikipedia.org\/wiki\/Magnetic_stripe_card."},{"key":"e_1_3_2_1_34_1","unstructured":"Xensource. Xen credit scheduler. http:\/\/wiki.xensource.com\/xenwiki\/CreditScheduler.  Xensource. Xen credit scheduler. http:\/\/wiki.xensource.com\/xenwiki\/CreditScheduler."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046660.2046670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046660.2046670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:20Z","timestamp":1750240100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046660.2046670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,21]]},"references-count":34,"alternative-id":["10.1145\/2046660.2046670","10.1145\/2046660"],"URL":"https:\/\/doi.org\/10.1145\/2046660.2046670","relation":{},"subject":[],"published":{"date-parts":[[2011,10,21]]},"assertion":[{"value":"2011-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}