The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.11)
pp: 86-89
Matthew Green , Johns Hopkins University
ABSTRACT
If we're going to stick all the cryptographic services in cloud-based virtual machines, how secure can we expect them to be? The answer is—unfortunately—not very.
INDEX TERMS
Cloud computing, Cryptography, Virtual machines, Computer security, computer security, cloud computing, cryptography, virtual machines, side-channel attacks
CITATION
Matthew Green, "The Threat in the Cloud", IEEE Security & Privacy, vol.11, no. 1, pp. 86-89, Jan.-Feb. 2013, doi:10.1109/MSP.2013.20
REFERENCES
1. “What Powers Instagram: Hundreds of Instances, Dozens of Technologies,” Instagram, 2012; http://instagram-engineering.tumblr.com/ post/13649370142what-powers-instagram-hundreds-of-instances-dozens-of .
2. Y. Zhang et al., “Cross-VM Side Channels and Their Use to Extract Private Keys,” Proc. 19th ACM Conf. Computer and Communications Security (CCS 12), ACM, 2012, pp. 305–316.
3. P.C. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” Proc. 16th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto 96), Springer, 1996, pp. 104–113; www.cryptography.com/public/pdfTimingAttacks.pdf .
4. C. Percival, “Cache Missing for Fun and Profit,” 2005; http://css.csail.mit.edu/6.858/2012/readings ht-cache.pdf.
5. T. Ristenpart et al., “Cross-VM Vulnerabilities in Cloud Computing,” presentation at 29th Int'l Cryptology Conf. (Crypto 09) rump session, 2009; http://rump2009.cr.yp.to8d9cebc9ad358331fcde611bf45f735d.pdf .
6. T. Ristenpart et al., “Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds,” Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM, pp. 199–212.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool