2012
DOI: 10.1007/978-3-642-30436-1_32
|View full text |Cite
|
Sign up to set email alerts
|

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds

Abstract: Cloud computing has changed how services are provided and supported through the computing infrastructure. However, recent work [11] reveals that virtual machine (VM) colocation based side-channel attack can leak users privacy. Techniques have been developed against side-channel attacks. Some of them like NoHype remove the hypervisor layer, which suggests radically changes of the current cloud architecture. While some other techniques may require new processor design that is not immediately available to the clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(56 citation statements)
references
References 11 publications
0
56
0
Order By: Relevance
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
“…The Shuffle technique rearranges the system setting in various layers (e..g., address ran-domization, migration, topology rearrangements) [12], [13], [14], [15], [16], [17], [18]. The Diversity technique provides equivalent functions with different implementations (e.g., operating systems, variant inputs and interpreters, variant software stack components) [19], [20], [21], [22], [23], [24], [25], [26].…”
Section: Introductionmentioning
confidence: 99%
“…Zhang et al [24] proposed to construct an incentive compatible moving target defense by periodically migrating virtual machines (VMs), thereby making it much harder for adversaries to locate the target VMs. Gillani et al [25] proposed to defend against DDoS attacks by migrating virtual networks (VNs) to dynamically reallocate network resources.…”
Section: Related Workmentioning
confidence: 99%
“…Our previous work (Zhang et al, 2012) proposed to periodically migrating VMs based on game theory, making it much harder for adversaries to locate the target VMs in terms of survivability measurement. However, our previous work did not discuss how to evaluate the security of a cloud placement and how to generate a placement plan to improve the cloud security.…”
Section: Related Workmentioning
confidence: 99%