A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
| dc.contributor.author | Semal, Benjamin | |
| dc.contributor.author | Markantonakis, Konstantinos | |
| dc.contributor.author | Akram, Raja Naeem | |
| dc.contributor.author | Kalbantner, Jan | |
| dc.contributor.editor | Zhou, Jianying | |
| dc.contributor.editor | Ahmed, Chuadhry Mujeeb | |
| dc.contributor.editor | Conti, Mauro | |
| dc.contributor.editor | Losiouk, Eleonora | |
| dc.contributor.editor | Au, Man Ho | |
| dc.contributor.editor | Batina, Lejla | |
| dc.contributor.editor | Li, Zhou | |
| dc.contributor.editor | Lin, Jingqiang | |
| dc.contributor.editor | Luo, Bo | |
| dc.contributor.editor | Majumdar, Suryadipta | |
| dc.contributor.editor | Meng, Weizhi | |
| dc.contributor.editor | Ochoa, Martín | |
| dc.contributor.editor | Picek, Stjepan | |
| dc.contributor.editor | Portokalidis, Georgios | |
| dc.contributor.editor | Wang, Cong | |
| dc.contributor.editor | Zhang, Kehuan | |
| dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.date.accessioned | 2022-03-18T09:59:01Z | |
| dc.date.available | 2022-03-18T09:59:01Z | |
| dc.date.issued | 2020-10-14 | |
| dc.format.extent | 18 | |
| dc.format.extent | 301604 | |
| dc.identifier | 175652458 | |
| dc.identifier | 0344ab4a-a24e-407d-8295-b6535f553783 | |
| dc.identifier | 85094103095 | |
| dc.identifier.citation | Semal, B, Markantonakis, K, Akram, R N & Kalbantner, J 2020, A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. in J Zhou, C M Ahmed, M Conti, E Losiouk, M H Au, L Batina, Z Li, J Lin, B Luo, S Majumdar, W Meng, M Ochoa, S Picek, G Portokalidis, C Wang & K Zhang (eds), Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S &P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings. vol. 12418, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12418 , Springer , Cham, Switzerland, pp. 360-377, CLOUD S &P 2020, Rome, Italy, 19/10/20. https://doi.org/10.1007/978-3-030-61638-0_20 | en |
| dc.identifier.citation | conference | en |
| dc.identifier.doi | 10.1007/978-3-030-61638-0_20 | |
| dc.identifier.isbn | 978-3-030-61637-3 | |
| dc.identifier.isbn | 978-3-030-61638-0 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.other | ORCID: /0000-0002-2789-4628/work/115777599 | |
| dc.identifier.uri | https://hdl.handle.net/2164/18244 | |
| dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85094103095&partnerID=8YFLogxK | en |
| dc.identifier.url | https://pure.royalholloway.ac.uk/en/publications/a-study-on-microarchitectural-covert-channel-vulnerabilities-in-i | en |
| dc.language.iso | eng | |
| dc.publisher | Springer | |
| dc.relation.ispartof | Applied Cryptography and Network Security Workshops | en |
| dc.relation.ispartofseries | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en |
| dc.subject | Covert channel | en |
| dc.subject | Microarchitectural attack | en |
| dc.subject | Cloud privacy | en |
| dc.subject | Vulnerability | en |
| dc.subject | Vulnerability study | en |
| dc.subject | QA75 Electronic computers. Computer science | en |
| dc.subject | Theoretical Computer Science | en |
| dc.subject | General Computer Science | en |
| dc.subject.lcc | QA75 | en |
| dc.title | A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service | en |
| dc.type | Conference item | en |
Files
Original bundle
1 - 1 of 1
