作者: Fangfei Liu , Yuval Yarom , Qian Ge , Gernot Heiser , Ruby B. Lee
DOI: 10.1109/SP.2015.43
关键词: Pre-play attack 、 Virtual machine 、 Computer security 、 Side channel attack 、 ElGamal encryption 、 Computer science 、 Cryptography 、 Cache 、 Watermarking attack 、 Covert channel 、 Timing attack 、 Computer network 、 Ciphertext-only attack 、 Cloud computing
摘要: … We exploit hardware features that are outside the control of the cloud provider (inclusive caches) or are controllable but generally enabled in the VMM for performance reasons (large …