{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:57Z","timestamp":1750221057364,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1314945"],"award-info":[{"award-number":["1314945"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,11]]},"DOI":"10.1145\/3267809.3267843","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T18:00:41Z","timestamp":1538157641000},"page":"361-373","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["I Heard It through the Firewall"],"prefix":"10.1145","author":[{"given":"Hyunwook","family":"Baek","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Eric","family":"Eide","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Robert","family":"Ricci","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Jacobus","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Services Amazon Web","year":"2018","unstructured":"Amazon Web Services . 2018 . AWS CloudTrail . Retrieved Aug. 24, 2018 from https:\/\/aws.amazon.com\/cloudtrail\/ Amazon Web Services. 2018. AWS CloudTrail. Retrieved Aug. 24, 2018 from https:\/\/aws.amazon.com\/cloudtrail\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Services Amazon Web","year":"2018","unstructured":"Amazon Web Services . 2018 . AWS Marketplace . Retrieved Aug. 24, 2018 from https:\/\/aws.amazon.com\/marketplace Amazon Web Services. 2018. AWS Marketplace. Retrieved Aug. 24, 2018 from https:\/\/aws.amazon.com\/marketplace"},{"key":"e_1_3_2_1_3_1","volume-title":"Netfilter's connection tracking system","author":"Ayuso Pablo Neira","year":"2006","unstructured":"Pablo Neira Ayuso . 2006. Netfilter's connection tracking system .; login: 31, 3 ( June 2006 ), 34--39. https:\/\/www.usenix.org\/publications\/login\/june-2006-volume-31-number-3\/netfilters-connection-tracking-system Pablo Neira Ayuso. 2006. Netfilter's connection tracking system.; login: 31, 3 (June 2006), 34--39. https:\/\/www.usenix.org\/publications\/login\/june-2006-volume-31-number-3\/netfilters-connection-tracking-system"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.97"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381915"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670995"},{"key":"e_1_3_2_1_8_1","unstructured":"Thomas Erl. 2005. Service-Oriented Architecture: Concepts Technology and Design. Pearson Education India.   Thomas Erl. 2005. Service-Oriented Architecture: Concepts Technology and Design. Pearson Education India."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Flux Research Group","year":"2018","unstructured":"Flux Research Group . 2018 . D430: The Emulab Dell R430 (aka \"d430\") machines . Retrieved Aug. 24, 2018 from https:\/\/wiki.emulab.net\/wiki\/d430 Flux Research Group. 2018. D430: The Emulab Dell R430 (aka \"d430\") machines. Retrieved Aug. 24, 2018 from https:\/\/wiki.emulab.net\/wiki\/d430"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Flux Research Group","year":"2018","unstructured":"Flux Research Group . 2018 . D710: The \"d710\" Nodes . Retrieved Aug. 24, 2018 from https:\/\/wiki.emulab.net\/wiki\/d710 Flux Research Group. 2018. D710: The \"d710\" Nodes. Retrieved Aug. 24, 2018 from https:\/\/wiki.emulab.net\/wiki\/d710"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_13_1","volume-title":"Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang , Wei Xu , and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 ( 2015 ), 10. http:\/\/arxiv.org\/abs\/1508.01991 Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 (2015), 10. http:\/\/arxiv.org\/abs\/1508.01991"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. NSDI. 589--603","author":"Mace Jonathan","year":"2015","unstructured":"Jonathan Mace , Peter Bodik , Rodrigo Fonseca , and Madanlal Musuvathi . 2015 . Retro: Targeted Resource Management in Multi-tenant Distributed Systems . In Proc. NSDI. 589--603 . https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/mace Jonathan Mace, Peter Bodik, Rodrigo Fonseca, and Madanlal Musuvathi. 2015. Retro: Targeted Resource Management in Multi-tenant Distributed Systems. In Proc. NSDI. 589--603. https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/mace"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_16_1","unstructured":"Microsoft. 2017 . Azure Marketplace . Retrieved Aug. 24, 2018 from https:\/\/azuremarketplace.microsoft.com\/en-us Microsoft. 2017. Azure Marketplace. Retrieved Aug. 24, 2018 from https:\/\/azuremarketplace.microsoft.com\/en-us"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3132020"},{"key":"e_1_3_2_1_19_1","volume-title":"Le","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever , Oriol Vinyals , and Quoc V . Le . 2014 . Sequence to Sequence Learning with Neural Networks. In Advances in Neural Information Processing Systems 27, Zoubin Ghahramani, Max Welling, Corinna Cortes, Neil D. Lawrence, and Kilian Q. Weinberger (Eds.). Curran Associates, Inc ., 3104--3112. https:\/\/papers.nips.cc\/paper\/5346-sequence-to-sequence-learning-with-neural-networks Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. 2014. Sequence to Sequence Learning with Neural Networks. In Advances in Neural Information Processing Systems 27, Zoubin Ghahramani, Max Welling, Corinna Cortes, Neil D. Lawrence, and Kilian Q. Weinberger (Eds.). Curran Associates, Inc., 3104--3112. https:\/\/papers.nips.cc\/paper\/5346-sequence-to-sequence-learning-with-neural-networks"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. USENIX Security. 913--928","author":"Varadarajan Venkatanathan","year":"2015","unstructured":"Venkatanathan Varadarajan , Yinqian Zhang , Thomas Ristenpart , and Michael Swift . 2015 . A Placement Vulnerability Study in Multi-Tenant Public Clouds . In Proc. USENIX Security. 913--928 . https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, and Michael Swift. 2015. A Placement Vulnerability Study in Multi-Tenant Public Clouds. In Proc. USENIX Security. 913--928. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/varadarajan"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.20"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. USENIX Security. 159--173","author":"Wu Zhenyu","year":"2012","unstructured":"Zhenyu Wu , Zhang Xu , and Haining Wang . 2012 . Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud . In Proc. USENIX Security. 159--173 . https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu Zhenyu Wu, Zhang Xu, and Haining Wang. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In Proc. USENIX Security. 159--173. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/wu"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. USENIX Security. 929--944","author":"Xu Zhang","year":"2015","unstructured":"Zhang Xu , Haining Wang , and Zhenyu Wu . 2015 . A Measurement Study on Co-residence Threat Inside the Cloud . In Proc. USENIX Security. 929--944 . https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu Zhang Xu, Haining Wang, and Zhenyu Wu. 2015. A Measurement Study on Co-residence Threat Inside the Cloud. In Proc. USENIX Security. 929--944. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. USENIX Security. 719--732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In Proc. USENIX Security. 719--732 . https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proc. USENIX Security. 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"event":{"name":"SoCC '18: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Carlsbad CA USA","acronym":"SoCC '18"},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267809.3267843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267809.3267843","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267809.3267843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:30Z","timestamp":1750207470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267809.3267843"}},"subtitle":["Exploiting Cloud Management Services as an Information Leakage Channel"],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":28,"alternative-id":["10.1145\/3267809.3267843","10.1145\/3267809"],"URL":"https:\/\/doi.org\/10.1145\/3267809.3267843","relation":{},"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"2018-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}