{"id":"https://openalex.org/W4205435139","doi":"https://doi.org/10.1109/milcom52596.2021.9652991","title":"SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud","display_name":"SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W4205435139","doi":"https://doi.org/10.1109/milcom52596.2021.9652991"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652991","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113699811","display_name":"Xiaojie Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojie Tao","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100436492","display_name":"Limin Wang","orcid":"https://orcid.org/0000-0001-9618-9239"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083915362","display_name":"Zhen Xu","orcid":"https://orcid.org/0000-0001-7011-3236"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112928052","display_name":"Ru Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Xie","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.756396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"329","last_page":"334"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9888,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.988,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8266306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80687743},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.74027836},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7174766},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5462768},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5397031},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5311521},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.52536714},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5169615},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4832133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46486315},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44723395},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39107433},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38550636},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652991","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.66,"id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W1503814339","https://openalex.org/W1555558540","https://openalex.org/W1584476834","https://openalex.org/W1647124656","https://openalex.org/W1934458198","https://openalex.org/W1992291252","https://openalex.org/W2001759130","https://openalex.org/W2036853599","https://openalex.org/W2119028650","https://openalex.org/W2255548496","https://openalex.org/W2337480911","https://openalex.org/W2394822940","https://openalex.org/W2491829854","https://openalex.org/W2505343551","https://openalex.org/W2507765405","https://openalex.org/W2600769197","https://openalex.org/W2744175342","https://openalex.org/W2807551428","https://openalex.org/W2810584084","https://openalex.org/W2899912069","https://openalex.org/W2905079206","https://openalex.org/W2905380323","https://openalex.org/W2949090999","https://openalex.org/W2952265249","https://openalex.org/W2978655370","https://openalex.org/W3045670632","https://openalex.org/W98341770"],"related_works":["https://openalex.org/W2747005099","https://openalex.org/W2743348030","https://openalex.org/W2179519055","https://openalex.org/W2148749405","https://openalex.org/W2145292010","https://openalex.org/W2104105430","https://openalex.org/W2086039693","https://openalex.org/W1991063492","https://openalex.org/W1973516247","https://openalex.org/W1515917392"],"abstract_inverted_index":{"Infrastructure":[0],"as":[1,39],"a":[2,66,79,90,208],"Service":[3],"(IaaS)":[4],"cloud":[5,77],"enables":[6],"tenants":[7],"to":[8,55,93,132,137,159,172,186,199],"access":[9],"computing":[10],"infrastructure":[11],"easily.":[12],"An":[13],"underlying":[14],"physical":[15,19,36],"machine":[16],"that":[17,215],"provides":[18],"resources":[20,37],"can":[21,61],"host":[22],"multiple":[23],"virtual":[24],"machines":[25],"(VMs)":[26],"from":[27],"different":[28],"tenants.":[29],"These":[30],"co-resident":[31,56,197],"VMs":[32,198],"share":[33],"the":[34,75,97,120,125,129,140,144,148,151,160,166,173,178,188],"same":[35],"such":[38],"CPU":[40],"cache,":[41],"memory,":[42],"network":[43],"interface":[44],"card,":[45],"among":[46],"which":[47],"cache-based":[48],"side-channel":[49],"attacks":[50],"(CSCAs)":[51],"pose":[52],"severe":[53],"threats":[54],"VMs.":[57],"A":[58],"malicious":[59],"attacker":[60],"steal":[62],"confidential":[63],"information":[64],"of":[65,74,103,190,196],"victim":[67],"through":[68],"CSCAs.":[69,83],"The":[70],"accessibility":[71],"and":[72,165,220],"sharing":[73],"IaaS":[76,99],"provide":[78],"natural":[80],"ground":[81],"for":[82],"In":[84,119,147,177],"this":[85],"paper,":[86],"we":[87,123,181],"propose":[88],"SCAMS,":[89],"novel":[91],"system":[92],"mitigate":[94],"CSCAs":[95,219],"in":[96,128,143,207],"multi-tenant":[98],"cloud.":[100],"SCAMS":[101,206],"consists":[102],"three":[104],"phases:":[105],"(i)":[106],"vulnerable":[107],"cryptographic":[108,126,135,157],"operations":[109],"capturing;":[110],"(ii)":[111],"proactive":[112],"event":[113,162,167],"notification;":[114],"(iii)":[115],"cache":[116,174,191,194,202],"anomaly":[117],"monitoring.":[118],"capturing":[121],"phase,":[122,150,180],"modify":[124],"library":[127],"protected":[130],"VM":[131],"allow":[133],"sensitive":[134,156],"functions":[136,142,154],"trap":[138],"into":[139],"handler":[141,153],"hypervisor":[145,152],"actively.":[146],"notification":[149],"forward":[155],"events":[158],"unified":[161],"notifier":[163,168],"module,":[164],"sends":[169],"monitoring":[170,175,179],"instructions":[171],"module.":[176],"apply":[182],"hardware":[183],"performance":[184,223],"counters":[185],"monitor":[187],"number":[189],"hits":[192],"or":[193],"misses":[195],"analyze":[200],"their":[201],"behaviors.":[203],"We":[204],"implement":[205],"virtualization":[209],"platform.":[210],"Our":[211],"experimental":[212],"results":[213],"show":[214],"it":[216],"defends":[217],"against":[218],"introduces":[221],"acceptable":[222],"overhead.":[224]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4205435139","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2024-12-14T19:51:18.259177","created_date":"2022-01-26"}