{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T19:51:18Z","timestamp":1720813878631},"reference-count":47,"publisher":"Zhejiang University Press","issue":"5","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1631\/fitee.1800526","type":"journal-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T11:02:38Z","timestamp":1560855758000},"page":"731-748","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines"],"prefix":"10.1631","volume":"20","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4796-7011","authenticated-orcid":false,"given":"Chao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yun-fei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hong-chao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Ya-wen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Ling-shu","family":"Li","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"1386_CR1","doi-asserted-by":"publisher","unstructured":"Almeida JB, Barbosa M, Barthe G, et al., 2016. Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC. 23rd Int Conf on Fast Software Encryption, p.163\u2013184. \n https:\/\/doi.org\/10.1007\/978-3-662-52993-5_9","DOI":"10.1007\/978-3-662-52993-5_9"},{"key":"1386_CR2","unstructured":"Amazon EC2, 2018. Amazon EC2. \n https:\/\/amazonaws-china.com\/cn\/events\/ec2\/?sc_channel=ps\n \n &sc_campaign=inbounddg&c_publisher=baidu&sc_detail={ec2%20amazon}&sc_country=cn&sc_geo=chna&sc_categoryec2&sc_segment={AWS%20EC2 brand}&sc_outcome=field&trkCampaign=inbounddg_ec2&trk=Baidu AWS%20EC2 brand ec2%20amazon&audience=205636 [Accessed on Aug. 4, 2018]."},{"key":"1386_CR3","doi-asserted-by":"publisher","unstructured":"Bosman E, Razavi K, Bos H, et al., 2016. Dedup est Machina: memory deduplication as an advanced exploitation vector. IEEE Symp on Security and Privacy, p.987\u20131004. \n https:\/\/doi.org\/10.1109\/SP.2016.63","DOI":"10.1109\/SP.2016.63"},{"key":"1386_CR4","doi-asserted-by":"publisher","unstructured":"Douceur JR, 2002. The Sybil attack. 1st Int Workshop on Peer-to-Peer Systems, p.251\u2013260. \n https:\/\/doi.org\/10.1007\/3-540-45748-8_24","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"3","key":"1386_CR5","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TCC.2015.2451633","volume":"5","author":"PD Ezhilchelvan","year":"2017","unstructured":"Ezhilchelvan PD, Mitrani I, 2017. Evaluating the probability of malicious co-residency in public clouds. IEEE Trans Cloud Comput, 5(3):420\u2013427. \n https:\/\/doi.org\/10.1109\/TCC.2015.2451633","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"1386_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"DG Feng","year":"2011","unstructured":"Feng DG, Zhang M, Zhang Y, et al., 2011. Study on cloud computing security. J Softw, 22(1):71\u201383 (in Chinese). \n https:\/\/doi.org\/10.3724\/SPJ.1001.2011.03958","journal-title":"J Softw"},{"key":"1386_CR7","doi-asserted-by":"publisher","first-page":"498","DOI":"10.2307\/2273574","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS, 1979. Computers and intractability: a guide to the theory of NP-completeness. W.H. Freeman & Co., New York, NY, USA, p.498\u2013500. \n https:\/\/doi.org\/10.2307\/2273574"},{"key":"1386_CR8","doi-asserted-by":"publisher","unstructured":"Gruss D, Maurice C, Wagner K, et al., 2016. Flush+Flush: a fast and stealthy cache attack. Int Conf on Detection of Intrusions and Malware, and Vulnerability Assessment, p.279\u2013299. \n https:\/\/doi.org\/10.1007\/978-3-319-40667-1_14","DOI":"10.1007\/978-3-319-40667-1_14"},{"issue":"3","key":"1386_CR9","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TIFS.2015.2505680","volume":"11","author":"Y Han","year":"2016","unstructured":"Han Y, Alpcan T, Chan J, et al., 2016. A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inform Forens Secur, 11(3):556\u2013570. \n https:\/\/doi.org\/10.1109\/TIFS.2015.2505680","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"1","key":"1386_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/TDSC.2015.2429132","volume":"14","author":"Y Han","year":"2017","unstructured":"Han Y, Chan J, Alpcan T, et al., 2017. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Depend Secur Comput, 14(1):95\u2013108. \n https:\/\/doi.org\/10.1109\/TDSC.2015.2429132","journal-title":"IEEE Trans Depend Secur Comput"},{"issue":"3","key":"1386_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1049\/iet-ifs.2017.0086","volume":"12","author":"HC Hu","year":"2018","unstructured":"Hu HC, Wu JX, Wang ZP, et al., 2018. Mimic defense: a designed-in cybersecurity defense framework. IET Inform Secur, 12(3):226\u2013237. \n https:\/\/doi.org\/10.1049\/iet-ifs.2017.0086","journal-title":"IET Inform Secur"},{"key":"1386_CR12","doi-asserted-by":"publisher","unstructured":"Irazoqui G, Eisenbarth T, Sunar B, 2015. S$A: a shared cache attack that works across cores and defies VM sandboxing \u2014 and its application to AES. IEEE Symp on Security and Privacy, p.591\u2013604. \n https:\/\/doi.org\/10.1109\/SP.2015.42","DOI":"10.1109\/SP.2015.42"},{"key":"1386_CR13","doi-asserted-by":"publisher","unstructured":"K\u00e4m\u00e4r\u00e4inen T, Shan YQ, Siekkinen M, et al., 2015. Virtual machines vs. containers in cloud gaming systems. Int Workshop on Network and Systems Support for Games, p.1\u20136. \n https:\/\/doi.org\/10.1109\/NetGames.2015.7382987","DOI":"10.1109\/NetGames.2015.7382987"},{"key":"1386_CR14","unstructured":"Kim T, Peinado M, Mainar-Ruiz G, 2012. STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud. 21st USENIX Conf on Security Symp, p.1\u201311."},{"key":"1386_CR15","doi-asserted-by":"publisher","unstructured":"Kwiat L, Kamhoua CA, Kwiat KA, et al., 2015. Security-aware virtual machine allocation in the cloud: a game theoretic approach. Proc IEEE 8th Int Conf on Cloud Computing, p.556\u2013563. \n https:\/\/doi.org\/10.1109\/CLOUD.2015.80","DOI":"10.1109\/CLOUD.2015.80"},{"key":"1386_CR16","doi-asserted-by":"publisher","unstructured":"Li H, Ota K, Dong MX, et al., 2017. Multimedia processing pricing strategy in GPU-accelerated cloud computing. IEEE Trans Cloud Comput, p.1. \n https:\/\/doi.org\/10.1109\/TCC.2017.2672554","DOI":"10.1109\/TCC.2017.2672554"},{"key":"1386_CR17","doi-asserted-by":"publisher","unstructured":"Li H, Ota K, Dong MX, 2018. Virtual network recognition and optimization in SDN-enabled cloud environment. IEEE Trans Cloud Comput, p.1. \n https:\/\/doi.org\/10.1109\/TCC.2018.2871118","DOI":"10.1109\/TCC.2018.2871118"},{"issue":"2","key":"1386_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/2670940","volume":"17","author":"P Li","year":"2014","unstructured":"Li P, Gao DB, Reiter MK, 2014. StopWatch: a cloud architecture for timing channel mitigation. ACM Trans Inform Syst Secur, 17(2):28. \n https:\/\/doi.org\/10.1145\/2670940","journal-title":"ACM Trans Inform Syst Secur"},{"key":"1386_CR19","unstructured":"Lingeling, 2018. Lingeling, Plingeling and Treengeling. \n http:\/\/fmv.jku.at\/lingeling\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR20","doi-asserted-by":"publisher","unstructured":"Liu FF, Lee RB, 2014. Random fill cache architecture. 47th Annual IEEE\/ACM Int Symp on Microarchitecture, p.203\u2013215. \n https:\/\/doi.org\/10.1109\/MICRO.2014.28","DOI":"10.1109\/MICRO.2014.28"},{"key":"1386_CR21","doi-asserted-by":"publisher","unstructured":"Liu FF, Yarom Y, Ge Q, et al., 2015. Last-level cache side-channel attacks are practical. IEEE Symp on Security and Privacy, p.605\u2013622. \n https:\/\/doi.org\/10.1109\/SP.2015.43","DOI":"10.1109\/SP.2015.43"},{"key":"1386_CR22","unstructured":"MariaDB, 2018. The MariaDB Foundation-Supporting Continuity and Open Collaboration in the MariaDB Ecosystem. \n https:\/\/mariadb.org\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR23","unstructured":"Microsoft Azure, 2018. Microsoft Azure. \n https:\/\/azure.microsoft.com\/zh-cn\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR24","unstructured":"Migrate Instances, 2018. Migrate Instances. \n https:\/\/docs.openstack.org\/nova\/rocky\/admin\/migration.html\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR25","doi-asserted-by":"publisher","unstructured":"Moon SJ, Sekar V, Reiter MK, 2015. Nomad: mitigating arbitrary cloud side channels via provider-assisted migration. 22nd ACM SIGSAC Conf on Computer and Communications Security, p.1595\u20131606. \n https:\/\/doi.org\/10.1145\/2810103.2813706","DOI":"10.1145\/2810103.2813706"},{"key":"1386_CR26","unstructured":"Moscibroda T, Mutlu O, 2007. Memory performance attacks: denial of memory service in multi-core systems. Proc 16th USENIX Security Symp, Article 18. Nginx, 2018. Nginx News. \n http:\/\/nginx.org\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR27","unstructured":"OpenStack, 2018. The Open Infrastructure Summit CFP is Now Open! \n https:\/\/www.openstack.org\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR28","unstructured":"Pattuk E, Kantarcioglu M, Lin ZQ, et al., 2014. Preventing cryptographic key leakage in cloud virtual machines. Proc 23rd USENIX Conf on Security Symp, p.703\u2013718."},{"key":"1386_CR29","unstructured":"Rackspace, 2018. Transform the Way You Do Business. \n https:\/\/www.rackspace.com\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR30","doi-asserted-by":"publisher","unstructured":"Raj H, Nathuji R, Singh A, et al., 2009. Resource management for isolation enhanced cloud services. Proc ACM Workshop on Cloud Computing Security, p.77\u201384. \n https:\/\/doi.org\/10.1145\/1655008.1655019","DOI":"10.1145\/1655008.1655019"},{"key":"1386_CR31","doi-asserted-by":"publisher","unstructured":"Ristenpart T, Tromer E, Shacham H, et al., 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proc 16th ACM Conf on Computer and Communications Security, p.199\u2013212. \n https:\/\/doi.org\/10.1145\/1653662.1653687","DOI":"10.1145\/1653662.1653687"},{"issue":"9","key":"1386_CR32","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/BF02837777","volume":"1","author":"RK Shyamasundar","year":"1996","unstructured":"Shyamasundar RK, 1996. Introduction to algorithms. Resonance, 1(9):14\u201324. \n https:\/\/doi.org\/10.1007\/BF02837777","journal-title":"Resonance"},{"key":"1386_CR33","doi-asserted-by":"publisher","unstructured":"Thompson M, Evans N, Kisekka V, 2014. Multiple OS rotational environment an implemented moving target defense. 7th Int Symp on Resilient Control Systems, p.1\u20136. \n https:\/\/doi.org\/10.1109\/ISRCS.2014.6900086","DOI":"10.1109\/ISRCS.2014.6900086"},{"key":"1386_CR34","unstructured":"Varadarajan V, Ristenpart T, Swift M, 2014. Scheduler-based defenses against cross-VM side-channels. Proc 23rd USENIX Conf on Security Symp, p.687\u2013702."},{"key":"1386_CR35","doi-asserted-by":"publisher","unstructured":"Vattikonda BC, Das S, Shacham H, 2011. Eliminating fine grained timers in Xen. 3rd ACM Workshop on Cloud Computing Security Workshop, p.41\u201346. \n https:\/\/doi.org\/10.1145\/2046660.2046671","DOI":"10.1145\/2046660.2046671"},{"key":"1386_CR36","doi-asserted-by":"publisher","unstructured":"Wang HX, Li F, Chen SQ, 2016. Towards cost-effective moving target defense against DDoS and covert channel attacks. Proc ACM Workshop on Moving Target Defense, p.15\u201325. \n https:\/\/doi.org\/10.1145\/2995272.2995281","DOI":"10.1145\/2995272.2995281"},{"issue":"2","key":"1386_CR37","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1145\/1273440.1250723","volume":"35","author":"ZH Wang","year":"2007","unstructured":"Wang ZH, Lee RB, 2007. New cache designs for thwarting software cache-based side channel attacks. ACM SIGARCH Comput Arch News, 35(2):494\u2013505. \n https:\/\/doi.org\/10.1145\/1273440.1250723","journal-title":"ACM SIGARCH Comput Arch News"},{"key":"1386_CR38","doi-asserted-by":"publisher","unstructured":"Wang ZH, Lee RB, 2008. A novel cache architecture with enhanced performance and security. 41st IEEE\/ACM Int Symp on Microarchitecture, p.83\u201393. \n https:\/\/doi.org\/10.1109\/MICRO.2008.4771781","DOI":"10.1109\/MICRO.2008.4771781"},{"key":"1386_CR39","unstructured":"WikiBench, 2018. WikiBench. \n http:\/\/www.wikibench.eu\/\n \n [Accessed on Aug. 4, 2018]."},{"key":"1386_CR40","doi-asserted-by":"publisher","unstructured":"Wu J, Dong MX, Ota K, et al., 2017. FCSS: fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans Emerg Top Comput, p.1. \n https:\/\/doi.org\/10.1109\/TETC.2017.2747158","DOI":"10.1109\/TETC.2017.2747158"},{"issue":"1","key":"1386_CR41","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu J, Dong MX, Ota K, et al., 2018. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manag, 15(1):27\u201338. \n https:\/\/doi.org\/10.1109\/TNSM.2018.2799000","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"4","key":"1386_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.19363\/j.cnki.cn10-1380\/tn.2016.04.001","volume":"1","author":"JX Wu","year":"2016","unstructured":"Wu JX, 2016. Research on cyber mimic defense. J Cyber Secur, 1(4):1\u201310 (in Chinese). \n https:\/\/doi.org\/10.19363\/j.cnki.cn10-1380\/tn.2016.04.001","journal-title":"J Cyber Secur"},{"key":"1386_CR43","unstructured":"Yarom Y, Falkner K, 2014. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. Proc 23rd USENIX Conf on Security Symp, p.719\u2013732."},{"key":"1386_CR44","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-642-30436-1_32","volume-title":"Information Security and Privacy Research","author":"YL Zhang","year":"2012","unstructured":"Zhang YL, Li M, Bai K, et al., 2012. Incentive compatible moving target defense against VM-colocation attacks in clouds. In: Gritzalis D, Furnell S, Theoharidou M (Eds.), Information Security and Privacy Research. Springer Berlin Heidelberg, Germany, p.388\u2013399. \n https:\/\/doi.org\/10.1007\/978-3-642-30436-1_32"},{"key":"1386_CR45","doi-asserted-by":"publisher","unstructured":"Zhang YQ, Reiter MK, 2013. D\u00fcppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. Proc ACM SIGSAC Conf on Computer & Communications Security, p.827\u2013838. \n https:\/\/doi.org\/10.1145\/2508859.2516741","DOI":"10.1145\/2508859.2516741"},{"key":"1386_CR46","doi-asserted-by":"publisher","unstructured":"Zhang YQ, Juels A, Reiter MK, et al., 2012. Cross-VM side channels and their use to extract private keys. Proc ACM Conf on Computer and Communications Security, p.305\u2013316. \n https:\/\/doi.org\/10.1145\/2382196.2382230","DOI":"10.1145\/2382196.2382230"},{"key":"1386_CR47","doi-asserted-by":"publisher","unstructured":"Zhang YQ, Juels A, Reiter MK, et al., 2014. Cross-tenant side-channel attacks in PaaS clouds. Proc ACM SIGSAC Conf on Computer and Communications Security, p.990\u20131003. \n https:\/\/doi.org\/10.1145\/2660267.2660356","DOI":"10.1145\/2660267.2660356"}],"container-title":["Frontiers of Information Technology & Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800526.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1800526\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800526.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T23:05:35Z","timestamp":1592348735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1800526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1386"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1800526","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]},"assertion":[{"value":"31 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}