Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources

@article{Chiang2015SwiperEV,
  title={Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources},
  author={Ron Chi-Lung Chiang and Sundaresan Rajasekaran and Nan Zhang and H. Howie Huang},
  journal={IEEE Transactions on Parallel and Distributed Systems},
  year={2015},
  volume={26},
  pages={1732-1742}
}
The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), each application should be allocated to an independently managed VM and isolated from one another. Unfortunately, the absence of physical isolation inevitably opens doors to a number of security threats. In… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 79 references

Global site speed overview: How fast are websites around the world? [Online]. Available: http://analytics.blogspot.com/2012/04/global-sitespeed-overview-how-fa st-are.html

  • M.M.T. Arvind Jain, I. Grigorik
  • 2013
1 Excerpt

Powering a google search [Online]. Available: http:// googleblog.blogspot.com/2009/01/powering-google-search

  • U. H€ olzle
  • 2013
1 Excerpt

Similar Papers

Loading similar papers…