Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382228
|View full text |Cite
|
Sign up to set email alerts
|

Resource-freeing attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 135 publications
(7 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…The authors implement a prototype on top of the Xen hypervisor, adding about 14 % of overhead for each context switch and interrupt. Validation is done by checking the accuracy of accounting under resource interference- [52] and escape- [53] controlled attacks. Although they provide results within 2 % of the ground truth in such scenarios, there is no guarantee that measurements coming from SMM are not tampered with during control switch to enclave entry points.…”
Section: Related Workmentioning
confidence: 99%
“…The authors implement a prototype on top of the Xen hypervisor, adding about 14 % of overhead for each context switch and interrupt. Validation is done by checking the accuracy of accounting under resource interference- [52] and escape- [53] controlled attacks. Although they provide results within 2 % of the ground truth in such scenarios, there is no guarantee that measurements coming from SMM are not tampered with during control switch to enclave entry points.…”
Section: Related Workmentioning
confidence: 99%
“…Ristenpart et al [2009] show that it is possible to (i) map the internal Cloud infrastructure, (ii) identify where a particular target VM is likely to reside, (iii) instantiate new VMs until one is placed co-resident with the target. Another attack, called resource-freeing attacks, modifies the workload of a victim VM in a way that it frees up resources for the benefit of the attacker's VM [Varadarajan et al 2012].…”
Section: Existing Attacksmentioning
confidence: 99%
“…Bugiel et al [36] investigate the security of the Amazon Image ecosystem. Bates et al [37][38][39][40] investigated the impact of resource sharing among multiple virtual instances, especially targeting a shared network interface card (NIC). Bowers et al [41,42] consider file duplication for fault-tolerance and local distribution of file storing in clouds.…”
Section: Cloud Identificationmentioning
confidence: 99%