{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:04:00Z","timestamp":1698797040563},"reference-count":47,"publisher":"Wiley","issue":"16","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"name":"National High-tech R&D Program of China (\u201c863\u201d Program)","award":["2015AA016004"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1536204","61373169","61303213"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)"},{"name":"Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2016,11,10]]},"DOI":"10.1002\/sec.1560","type":"journal-article","created":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T05:43:05Z","timestamp":1468820585000},"page":"3543-3557","source":"Crossref","is-referenced-by-count":3,"title":["A novel covert channel detection method in cloud based on XSRM and improved event association algorithm"],"prefix":"10.1002","volume":"9","author":[{"given":"Lina","family":"Wang","sequence":"first","affiliation":[{"name":"Computer School; Wuhan University; Wuhan China"},{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing; Ministry of Education; Wuhan China"}]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[{"name":"Computer School; Wuhan University; Wuhan China"},{"name":"School of Information Systems; Singapore Management University; Singapore"}]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering; Thapar University; Patiala India"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"Computer School; Wuhan University; Wuhan China"},{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing; Ministry of Education; Wuhan China"}]},{"given":"Cheng","family":"Tan","sequence":"additional","affiliation":[{"name":"Computer School; Wuhan University; Wuhan China"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Systems; Singapore Management University; Singapore"}]}],"member":"311","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"issue":"3","key":"10.1002\/sec.1560-BIB0001|sec1560-cit-0001","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing cloud computing security issues","volume":"28","author":"Zissis","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"10.1002\/sec.1560-BIB0002|sec1560-cit-0002","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2185847","article-title":"Enabling personalized search over encrypted outsourced data with efficiency improvement","author":"Fu","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"issue":"2","key":"10.1002\/sec.1560-BIB0003|sec1560-cit-0003","first-page":"317","article-title":"Mutual verifiable provable data auditing in public cloud storage","volume":"16","author":"Ren","year":"2015","journal-title":"Journal of Internet Technology"},{"issue":"6","key":"10.1002\/sec.1560-BIB0004|sec1560-cit-0004","first-page":"929","article-title":"A variable threshold-value authentication architecture for wireless mesh networks","volume":"15","author":"Guo","year":"2014","journal-title":"Journal of Internet Technology"},{"key":"10.1002\/sec.1560-BIB0005|sec1560-cit-0005","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.future.2014.10.006","article-title":"Remote data possession checking with enhanced security for cloud storage","volume":"52","author":"Yu","year":"2015","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"10.1002\/sec.1560-BIB0006|sec1560-cit-0006","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10207-014-0263-8","article-title":"Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage","volume":"14","author":"Yu","year":"2015","journal-title":"International Journal of Information Security"},{"issue":"1","key":"10.1002\/sec.1560-BIB0007|sec1560-cit-0007","first-page":"190","article-title":"Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing","volume":"98","author":"Zhangjie","year":"2015","journal-title":"IEICE Transactions on Communications"},{"issue":"3","key":"10.1002\/sec.1560-BIB0008|sec1560-cit-0008","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11227-011-0608-2","article-title":"A vmm-based intrusion prevention system in cloud computing environment","volume":"66","author":"Jin","year":"2013","journal-title":"The Journal of Supercomputing"},{"issue":"10","key":"10.1002\/sec.1560-BIB0009|sec1560-cit-0009","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/1164394.1164414","article-title":"Virtual machines, virtual security?","volume":"49","author":"Bellovin","year":"2006","journal-title":"Communications of the ACM"},{"key":"10.1002\/sec.1560-BIB0010|sec1560-cit-0010","doi-asserted-by":"crossref","unstructured":"Okamura K Oyama Y Load-based covert channels between Xen virtual machines Proceedings of the 2010 ACM Symposium on Applied Computing 2010 173 180","DOI":"10.1145\/1774088.1774125"},{"issue":"4","key":"10.1002\/sec.1560-BIB0011|sec1560-cit-0011","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11416-009-0131-7","article-title":"Practical overview of a Xen covert channel","volume":"6","author":"Sala\u00fcn","year":"2010","journal-title":"Journal in computer virology"},{"key":"10.1002\/sec.1560-BIB0012|sec1560-cit-0012","doi-asserted-by":"crossref","unstructured":"Ristenpart T Tromer E Shacham H Savage S Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds Proceedings of the 16th ACM Conference on Computer and Communications Security 2009 199 212","DOI":"10.1145\/1653662.1653687"},{"key":"10.1002\/sec.1560-BIB0013|sec1560-cit-0013","doi-asserted-by":"crossref","unstructured":"Zhang Y Juels A Reiter MK Ristenpart T Cross-VM side channels and their use to extract private keys Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012 305 316","DOI":"10.1145\/2382196.2382230"},{"key":"10.1002\/sec.1560-BIB0014|sec1560-cit-0014","doi-asserted-by":"crossref","unstructured":"Zhang Y Juels A Oprea A Reiter MK Homealone: co-residency detection in the cloud via side-channel analysis security and privacy (sp), 2011 IEEE Symposium on 2011 313 328","DOI":"10.1109\/SP.2011.31"},{"key":"10.1002\/sec.1560-BIB0015|sec1560-cit-0015","unstructured":"Kim T Peinado M Mainar-Ruiz G Stealthmem: system-level protection against cache-based side channel attacks in the cloud Presented as part of the 21st Usenix Security Symposium (USENIX Security 12) 2012 189 204"},{"key":"10.1002\/sec.1560-BIB0016|sec1560-cit-0016","unstructured":"Varadarajan V Ristenpart T Swift M Scheduler-based defenses against cross-VM side-channels 23rd Usenix Security Symposium (USENIX Security 14) 2014 687 702"},{"key":"10.1002\/sec.1560-BIB0017|sec1560-cit-0017","doi-asserted-by":"crossref","unstructured":"Moon SJ Sekar V Reiter MK Nomad: mitigating arbitrary cloud side channels via provider-assisted migration Proceedings of the 22nd acm sigsac conference on computer and communications security 2015 1595 1606","DOI":"10.1145\/2810103.2813706"},{"issue":"10","key":"10.1002\/sec.1560-BIB0018|sec1560-cit-0018","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","article-title":"A note on the confinement problem","volume":"16","author":"Lampson","year":"1973","journal-title":"Communications of the ACM"},{"key":"10.1002\/sec.1560-BIB0019|sec1560-cit-0019","first-page":"192","volume-title":"ACM SIGOPS Operating Systems Review","volume":"9","author":"Lipner","year":"1975"},{"issue":"2-3","key":"10.1002\/sec.1560-BIB0020|sec1560-cit-0020","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A sound type system for secure flow analysis","volume":"4","author":"Volpano","year":"1996","journal-title":"Journal of Computer Security"},{"key":"10.1002\/sec.1560-BIB0021|sec1560-cit-0021","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/TSE.1987.226479","article-title":"An experience using two covert channel analysis techniques on a real system design","volume":"2","author":"Haigh","year":"1987","journal-title":"Software Engineering, IEEE Transactions on"},{"issue":"3","key":"10.1002\/sec.1560-BIB0022|sec1560-cit-0022","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1145\/357369.357374","article-title":"Shared resource matrix methodology: an approach to identifying storage and timing channels","volume":"1","author":"Kemmerer","year":"1983","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"issue":"6","key":"10.1002\/sec.1560-BIB0023|sec1560-cit-0023","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/32.55086","article-title":"On the identification of covert storage channels in secure systems","volume":"16","author":"Tsai","year":"1990","journal-title":"Software Engineering, IEEE Transactions on"},{"issue":"3","key":"10.1002\/sec.1560-BIB0024|sec1560-cit-0024","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11432-007-0028-3","article-title":"Design of secure operating systems with high security levels","volume":"50","author":"Qing","year":"2007","journal-title":"Science in China Series F: Information Sciences"},{"key":"10.1002\/sec.1560-BIB0025|sec1560-cit-0025","doi-asserted-by":"crossref","unstructured":"Bates A Mood B Pletcher J Pruse H Valafar M Butler K Detecting co-residency with active traffic analysis techniques Proceedings of the 2012 ACM Workshop On Cloud Computing Security Workshop 2012 1 12","DOI":"10.1145\/2381913.2381915"},{"key":"10.1002\/sec.1560-BIB0026|sec1560-cit-0026","unstructured":"Varadarajan V Zhang Y Ristenpart T Swift M A placement vulnerability study in multi-tenant public clouds 24th Usenix Security Symposium (USENIX Security 15) 2015 913 928"},{"issue":"3","key":"10.1002\/sec.1560-BIB0027|sec1560-cit-0027","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1002\/sec.754","article-title":"C2detector: a covert channel detection framework in cloud computing","volume":"7","author":"Wu","year":"2014","journal-title":"Security and Communication Networks"},{"issue":"SI","key":"10.1002\/sec.1560-BIB0028|sec1560-cit-0028","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/844128.844148","article-title":"Revirt: enabling intrusion analysis through virtual-machine logging and replay","volume":"36","author":"Dunlap","year":"2002","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"10.1002\/sec.1560-BIB0029|sec1560-cit-0029","unstructured":"Chen A Moore WB Xiao H Haeberlen A Phan LTX Sherr M Zhou W Detecting covert timing channels with time-deterministic replay 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) 2014 541 554"},{"issue":"3-4","key":"10.1002\/sec.1560-BIB0030|sec1560-cit-0030","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3233\/JCS-1992-13-403","article-title":"An analysis of covert timing channels","volume":"1","author":"Wray","year":"1992","journal-title":"Journal of Computer Security"},{"issue":"2","key":"10.1002\/sec.1560-BIB0031|sec1560-cit-0031","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2670940","article-title":"Stopwatch: a cloud architecture for timing channel mitigation","volume":"17","author":"Li","year":"2014","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"10.1002\/sec.1560-BIB0032|sec1560-cit-0032","doi-asserted-by":"crossref","unstructured":"Askarov A Zhang D Myers AC Predictive black-box mitigation of timing channels Proceedings of the 17th ACM Conference on Computer and Communications Security 2010 297 307","DOI":"10.1145\/1866307.1866341"},{"key":"10.1002\/sec.1560-BIB0033|sec1560-cit-0033","doi-asserted-by":"crossref","unstructured":"Zhang D Askarov A Myers AC Predictive mitigation of timing channels in interactive systems Proceedings of the 18th ACM Conference on Computer and Communications Security 2011 563 574","DOI":"10.1145\/2046707.2046772"},{"issue":"8","key":"10.1002\/sec.1560-BIB0034|sec1560-cit-0034","first-page":"1534","article-title":"Detecting and managing hidden process via hypervisor","volume":"48","author":"Lina","year":"2011","journal-title":"Journal of Computer Research and Development"},{"key":"10.1002\/sec.1560-BIB0035|sec1560-cit-0035","doi-asserted-by":"crossref","unstructured":"Tan Y Nguyen H Shen Z Gu X Venkatramani C Rajan D Prepare: predictive performance anomaly prevention for virtualized cloud systems Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on 2012 285 294","DOI":"10.1109\/ICDCS.2012.65"},{"issue":"3","key":"10.1002\/sec.1560-BIB0036|sec1560-cit-0036","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s11235-013-9737-7","article-title":"Detection of TCP covert channel based on Markov model","volume":"54","author":"Zhai","year":"2013","journal-title":"Telecommunication Systems"},{"key":"10.1002\/sec.1560-BIB0037|sec1560-cit-0037","doi-asserted-by":"crossref","unstructured":"Kadloor S Kiyavash N Venkitasubramaniam P Mitigating timing based information leakage in shared schedulers Infocom, 2012 Proceedings IEEE 2012 1044 1052","DOI":"10.1109\/INFCOM.2012.6195460"},{"issue":"2","key":"10.1002\/sec.1560-BIB0038|sec1560-cit-0038","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TNET.2014.2304439","article-title":"Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud","volume":"23","author":"Wu","year":"2015","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"10.1002\/sec.1560-BIB0039|sec1560-cit-0039","doi-asserted-by":"crossref","unstructured":"Wu J Ding L Wang Y Han W Identification and evaluation of sharing memory covert timing channel in Xen virtual machines Cloud Computing (CLOUD), 2011 IEEE International Conference on 2011 283 291","DOI":"10.1109\/CLOUD.2011.10"},{"key":"10.1002\/sec.1560-BIB0040|sec1560-cit-0040","doi-asserted-by":"crossref","unstructured":"Gao H Wang L Liu W Peng Y Zhang H Preventing secret data leakage from foreign mappings in virtual machines Security and Privacy in Communication Networks Springer 2011 436 445","DOI":"10.1007\/978-3-642-31909-9_25"},{"key":"10.1002\/sec.1560-BIB0041|sec1560-cit-0041","doi-asserted-by":"crossref","unstructured":"Hovhannisyan H Lu K Yang R Qi W Wang J Wen M A novel deduplication-based covert channel in cloud storage service 2015 IEEE Global Communications Conference (GLOBECOM) 2015 1 6","DOI":"10.1109\/GLOCOM.2015.7417228"},{"key":"10.1002\/sec.1560-BIB0042|sec1560-cit-0042","first-page":"191","volume-title":"NDSS","volume":"3","author":"Garfinkel","year":"2003"},{"issue":"6","key":"10.1002\/sec.1560-BIB0043|sec1560-cit-0043","doi-asserted-by":"crossref","first-page":"2251","DOI":"10.1016\/j.patcog.2011.12.017","article-title":"Determining the number of clusters using information entropy for mixed data","volume":"45","author":"Liang","year":"2012","journal-title":"Pattern Recognition"},{"key":"10.1002\/sec.1560-BIB0044|sec1560-cit-0044","unstructured":"Lee W Stolfo SJ et al Data mining approaches for intrusion detection Usenix security 1998 6 21"},{"key":"10.1002\/sec.1560-BIB0045|sec1560-cit-0045","unstructured":"libVMI API http:\/\/libvmi.com\/api"},{"key":"10.1002\/sec.1560-BIB0046|sec1560-cit-0046","unstructured":"LibVirt virtualization API http:\/\/libvirt.org\/html\/libvirt-libvirt-event.html"},{"key":"10.1002\/sec.1560-BIB0047|sec1560-cit-0047","article-title":"Busmonitor: a hypervisor-based solution for memory bus covert channels","author":"Saltaformaggio","year":"2013","journal-title":"Proceedings of EuroSec"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/sec.1560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,4]],"date-time":"2021-07-04T05:36:24Z","timestamp":1625376984000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1560"}},"subtitle":["A novel covert channel detection method in cloud based on XSRM and improved event association algorithm"],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":47,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2016,11,10]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1560","archive":["Portico"],"relation":{},"ISSN":["1939-0114"],"issn-type":[{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2016,7,18]]}}}