Show simple item record

dc.contributor.authorSemal, Benjamin
dc.contributor.authorMarkantonakis, Konstantinos
dc.contributor.authorAkram, Raja Naeem
dc.contributor.authorKalbantner, Jan
dc.contributor.editorZhou, Jianying
dc.contributor.editorAhmed, Chuadhry Mujeeb
dc.contributor.editorConti, Mauro
dc.contributor.editorLosiouk, Eleonora
dc.contributor.editorAu, Man Ho
dc.contributor.editorBatina, Lejla
dc.contributor.editorLi, Zhou
dc.contributor.editorLin, Jingqiang
dc.contributor.editorLuo, Bo
dc.contributor.editorMajumdar, Suryadipta
dc.contributor.editorMeng, Weizhi
dc.contributor.editorOchoa, Martín
dc.contributor.editorPicek, Stjepan
dc.contributor.editorPortokalidis, Georgios
dc.contributor.editorWang, Cong
dc.contributor.editorZhang, Kehuan
dc.date.accessioned2022-03-18T09:59:01Z
dc.date.available2022-03-18T09:59:01Z
dc.date.issued2020-10-14
dc.identifier175652458
dc.identifier0344ab4a-a24e-407d-8295-b6535f553783
dc.identifier85094103095
dc.identifier.citationSemal , B , Markantonakis , K , Akram , R N & Kalbantner , J 2020 , A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service . in J Zhou , C M Ahmed , M Conti , E Losiouk , M H Au , L Batina , Z Li , J Lin , B Luo , S Majumdar , W Meng , M Ochoa , S Picek , G Portokalidis , C Wang & K Zhang (eds) , Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops AIBlock, AIHWS, AIoTS, Cloud S &P, SCI, SecMT, and SiMLA Rome, Italy, October 19–22, 2020, Proceedings . vol. 12418 , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 12418 , Springer , Cham, Switzerland , pp. 360-377 , CLOUD S &P 2020 , Rome , Italy , 19/10/20 . https://doi.org/10.1007/978-3-030-61638-0_20en
dc.identifier.citationconferenceen
dc.identifier.isbn978-3-030-61637-3
dc.identifier.isbn978-3-030-61638-0
dc.identifier.issn0302-9743
dc.identifier.otherORCID: /0000-0002-2789-4628/work/115777599
dc.identifier.urihttps://hdl.handle.net/2164/18244
dc.format.extent18
dc.format.extent301604
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofApplied Cryptography and Network Security Workshopsen
dc.relation.ispartofseriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en
dc.subjectCovert channelen
dc.subjectMicroarchitectural attacken
dc.subjectCloud privacyen
dc.subjectVulnerabilityen
dc.subjectVulnerability studyen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subjectTheoretical Computer Scienceen
dc.subjectGeneral Computer Scienceen
dc.subject.lccQA75en
dc.titleA Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Serviceen
dc.typeConference itemen
dc.contributor.institutionUniversity of Aberdeen.Cybersecurity and Privacyen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.identifier.doihttps://doi.org/10.1007/978-3-030-61638-0_20
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85094103095&partnerID=8YFLogxKen
dc.identifier.urlhttps://pure.royalholloway.ac.uk/en/publications/a-study-on-microarchitectural-covert-channel-vulnerabilities-in-ien


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record