2010 IEEE 3rd International Conference on Cloud Computing 2010
DOI: 10.1109/cloud.2010.23
|View full text |Cite
|
Sign up to set email alerts
|

Attack Surfaces: A Taxonomy for Attacks on Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
79
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 160 publications
(80 citation statements)
references
References 6 publications
0
79
0
1
Order By: Relevance
“…• The SE creates a URL that points to malicious malware on a cloud-based system [59]. This URL is printed on a pamphlet and provided to job seekers who seek employment.…”
Section: Indirect Communication -Templatementioning
confidence: 99%
“…• The SE creates a URL that points to malicious malware on a cloud-based system [59]. This URL is printed on a pamphlet and provided to job seekers who seek employment.…”
Section: Indirect Communication -Templatementioning
confidence: 99%
“…A cloud scenario can be modelled with three participants: users, cloud instances, and cloud provider [27]. Every interaction in a cloud scenario can be addressed to two entities of these participant classes.…”
Section: Characterising System With Cloud Storage Scenariomentioning
confidence: 99%
“…Cloud Service Modified from Gruschka and Jensen [27] Below are the descriptions involved in the triangle attacks:…”
Section: Usermentioning
confidence: 99%
See 1 more Smart Citation
“…[3,21,24,44] The complexity of modern systems means that the attack surface for a malicious agent is huge. The system can be compromised at any level and leak information in hundred of possible ways, like improperly handling access rights to databases, or leaking kernel memory through improperly written implementations, or even allowing private keys to be recovered by analyzing the system's energy consumption.…”
Section: Introductionmentioning
confidence: 99%