Entry Li:2014:SCA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Li:2014:SCA,
  author =       "Peng Li and Debin Gao and Michael K. Reiter",
  title =        "{StopWatch}: a Cloud Architecture for Timing Channel
                 Mitigation",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "8:1--8:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2670940",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "This article presents StopWatch, a system that defends
                 against timing-based side-channel attacks that arise
                 from coresidency of victims and attackers in
                 infrastructure-as-a-service clouds. StopWatch
                 triplicates each cloud-resident guest virtual machine
                 (VM) and places replicas so that the three replicas of
                 a guest VM are coresident with nonoverlapping sets of
                 (replicas of) other VMs. StopWatch uses the timing of
                 I/O events at a VM's replicas collectively to determine
                 the timings observed by each one or by an external
                 observer, so that observable timing behaviors are
                 similarly likely in the absence of any other
                 individual, coresident VMs. We detail the design and
                 implementation of StopWatch in Xen, evaluate the
                 factors that influence its performance, demonstrate its
                 advantages relative to alternative defenses against
                 timing side channels with commodity hardware, and
                 address the problem of placing VM replicas in a cloud
                 under the constraints of StopWatch so as to still
                 enable adequate cloud utilization.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries