2011 - MILCOM 2011 Military Communications Conference 2011
DOI: 10.1109/milcom.2011.6127494
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting large data sets through memory de-duplication technique in virtual machines

Abstract: Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that they are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such information. In this paper, we propose a non-interactive mechanism to identify the data sets in use in a cloud computing environment when the virtual machine (VM) hypervisors adop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…These reading operations will not impact the deduplication procedures. Using the experiment results in [13], [24], [14], we can estimate the time that the algorithm needs to merge the pages. When the estimated delay expires, we will issue the "write" command to the pages of F 2.…”
Section: B Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…These reading operations will not impact the deduplication procedures. Using the experiment results in [13], [24], [14], we can estimate the time that the algorithm needs to merge the pages. When the estimated delay expires, we will issue the "write" command to the pages of F 2.…”
Section: B Experiments and Resultsmentioning
confidence: 99%
“…An implementation of the key extraction attack was presented in [23]. The delay caused by separation of deduplicated memory pages in virtual machines has been used to identify guest OS types [13] or derive out memory page contents [24].…”
Section: A Information Leakage Among Virtual Machinesmentioning
confidence: 99%