A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
dc.contributor.author | Semal, Benjamin | |
dc.contributor.author | Markantonakis, Konstantinos | |
dc.contributor.author | Akram, Raja Naeem | |
dc.contributor.author | Kalbantner, Jan | |
dc.contributor.editor | Zhou, Jianying | |
dc.contributor.editor | Ahmed, Chuadhry Mujeeb | |
dc.contributor.editor | Conti, Mauro | |
dc.contributor.editor | Losiouk, Eleonora | |
dc.contributor.editor | Au, Man Ho | |
dc.contributor.editor | Batina, Lejla | |
dc.contributor.editor | Li, Zhou | |
dc.contributor.editor | Lin, Jingqiang | |
dc.contributor.editor | Luo, Bo | |
dc.contributor.editor | Majumdar, Suryadipta | |
dc.contributor.editor | Meng, Weizhi | |
dc.contributor.editor | Ochoa, Martín | |
dc.contributor.editor | Picek, Stjepan | |
dc.contributor.editor | Portokalidis, Georgios | |
dc.contributor.editor | Wang, Cong | |
dc.contributor.editor | Zhang, Kehuan | |
dc.date.accessioned | 2022-03-18T09:59:01Z | |
dc.date.available | 2022-03-18T09:59:01Z | |
dc.date.issued | 2020-10-14 | |
dc.identifier.citation | Semal , B , Markantonakis , K , Akram , R N & Kalbantner , J 2020 , A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service . in J Zhou , C M Ahmed , M Conti , E Losiouk , M H Au , L Batina , Z Li , J Lin , B Luo , S Majumdar , W Meng , M Ochoa , S Picek , G Portokalidis , C Wang & K Zhang (eds) , Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S &P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings . vol. 12418 , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 12418 , Springer , Cham, Switzerland , pp. 360-377 , CLOUD S &P 2020 , Rome , Italy , 19/10/20 . https://doi.org/10.1007/978-3-030-61638-0_20 | en |
dc.identifier.citation | conference | en |
dc.identifier.isbn | 978-3-030-61637-3 | |
dc.identifier.isbn | 978-3-030-61638-0 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | PURE: 175652458 | |
dc.identifier.other | PURE UUID: 0344ab4a-a24e-407d-8295-b6535f553783 | |
dc.identifier.other | ORCID: /0000-0002-2789-4628/work/115777599 | |
dc.identifier.other | Scopus: 85094103095 | |
dc.identifier.uri | https://hdl.handle.net/2164/18244 | |
dc.format.extent | 18 | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Applied Cryptography and Network Security Workshops | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en |
dc.subject | Covert channel | en |
dc.subject | Microarchitectural attack | en |
dc.subject | Cloud privacy | en |
dc.subject | Vulnerability | en |
dc.subject | Vulnerability study | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject | Theoretical Computer Science | en |
dc.subject | Computer Science(all) | en |
dc.subject.lcc | QA75 | en |
dc.title | A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service | en |
dc.type | Conference item | en |
dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
dc.contributor.institution | University of Aberdeen.Computing Science | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-61638-0_20 | |
dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85094103095&partnerID=8YFLogxK | en |
dc.identifier.url | https://pure.royalholloway.ac.uk/en/publications/a-study-on-microarchitectural-covert-channel-vulnerabilities-in-i | en |