The Threat in the Cloud

被引:14
作者
Green, Matthew [1 ]
机构
[1] Johns Hopkins Univ, Informat Secur Inst, Baltimore, MD 21218 USA
关键词
cloud computing; computer security; cryptography; side-channel attacks; virtual machines;
D O I
10.1109/MSP.2013.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
If we're going to stick all the cryptographic services in cloud-based virtual machines, how secure can we expect them to be? The answer is—unfortunately—not very. © 2003-2012 IEEE.
引用
收藏
页码:86 / 89
页数:4
相关论文
共 6 条
[1]  
[Anonymous], P 16 ACM C COMP COMM
[2]  
[Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
[3]  
[Anonymous], 2012, WHAT POWERS INSTAGRA
[4]  
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
[5]  
Percival C., 2005, Cache Missing for Fun and Profit
[6]  
Ristenpart T., 2009, 29 INT CRYPT C CRYPT