{"id":"https://openalex.org/W2913851421","doi":"https://doi.org/10.1109/allerton.2018.8636050","title":"Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework","display_name":"Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2913851421","doi":"https://doi.org/10.1109/allerton.2018.8636050","mag":"2913851421"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2018.8636050","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2018.8636050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109171008","display_name":"Ahmed H. Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed H. Anwar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003612688","display_name":"George Atia","orcid":"https://orcid.org/0000-0001-7958-9855"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Atia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071514799","display_name":"Mina Guirguis","orcid":"https://orcid.org/0000-0003-2629-6172"},"institutions":[{"id":"https://openalex.org/I13511017","display_name":"Texas State University","ror":"https://ror.org/05h9q1g27","country_code":"US","type":"education","lineage":["https://openalex.org/I13511017"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mina Guirguis","raw_affiliation_strings":["Department of Computer Science, Texas State University, San Marcos, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas State University, San Marcos, TX","institution_ids":["https://openalex.org/I13511017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109171008"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61788419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"78","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7688364386558533},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7614690065383911},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7190053462982178},{"id":"https://openalex.org/keywords/collocation","display_name":"Collocation (remote sensing)","score":0.7179210186004639},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.6639100909233093},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6419293284416199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6044127941131592},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5822467803955078},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.470927894115448},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45121386647224426},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4306353032588959},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.22840732336044312},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12585139274597168},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12299573421478271},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.09920385479927063},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.07752960920333862}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7688364386558533},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7614690065383911},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7190053462982178},{"id":"https://openalex.org/C80023036","wikidata":"https://www.wikidata.org/wiki/Q5147531","display_name":"Collocation (remote sensing)","level":2,"score":0.7179210186004639},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.6639100909233093},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6419293284416199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6044127941131592},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5822467803955078},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.470927894115448},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45121386647224426},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4306353032588959},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.22840732336044312},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12585139274597168},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12299573421478271},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.09920385479927063},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.07752960920333862},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/allerton.2018.8636050","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2018.8636050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W51794740","https://openalex.org/W56540897","https://openalex.org/W98341770","https://openalex.org/W145322853","https://openalex.org/W1427174644","https://openalex.org/W1501439223","https://openalex.org/W1533945010","https://openalex.org/W1535012564","https://openalex.org/W1934458198","https://openalex.org/W1985906366","https://openalex.org/W1992291252","https://openalex.org/W2014143000","https://openalex.org/W2015787697","https://openalex.org/W2016668099","https://openalex.org/W2031195340","https://openalex.org/W2058189720","https://openalex.org/W2097718182","https://openalex.org/W2119028650","https://openalex.org/W2209091760","https://openalex.org/W2230744892","https://openalex.org/W2233360186","https://openalex.org/W2242996539","https://openalex.org/W2527789129","https://openalex.org/W2726907491","https://openalex.org/W2727450595","https://openalex.org/W2783892643","https://openalex.org/W2790756598","https://openalex.org/W2891464548","https://openalex.org/W2963919220","https://openalex.org/W3124157346","https://openalex.org/W6602379952","https://openalex.org/W6604021625","https://openalex.org/W6628261430","https://openalex.org/W6630071846","https://openalex.org/W6689577150","https://openalex.org/W6727979732","https://openalex.org/W6749160918","https://openalex.org/W6789946315"],"related_works":["https://openalex.org/W1987562536","https://openalex.org/W4383533535","https://openalex.org/W2375814310","https://openalex.org/W4255938919","https://openalex.org/W2903244929","https://openalex.org/W4380353856","https://openalex.org/W2347216446","https://openalex.org/W2733656312","https://openalex.org/W2976114880","https://openalex.org/W2328458106"],"abstract_inverted_index":{"In":[0,93],"a":[1,6,41,49,65,115],"side-channel":[2,57],"collocation":[3,58,84],"attack":[4],"on":[5],"multitenant":[7],"public":[8],"cloud,":[9],"an":[10,54],"adversary":[11,55,79],"seeks":[12,62,80],"to":[13,44,63,68,81,86,119,137],"leak":[14,87],"sensitive":[15],"information":[16,88],"through":[17],"launching":[18,56],"malicious":[19],"virtual":[20],"machines":[21],"(VMs)":[22],"that":[23,104],"would":[24],"collocate":[25],"with":[26],"the":[27,32,36,46,70,73,78,83,102,108,111,120,129,134,138],"victim":[28],"VM":[29],"and":[30,53,132],"bypass":[31],"isolation":[33],"provided":[34],"by":[35,107],"hypervisor.":[37],"This":[38],"paper":[39],"presents":[40],"game-theoretic":[42],"framework":[43],"study":[45],"interaction":[47],"between":[48],"cloud":[50],"provider":[51],"(defender)":[52],"attacks.":[59],"The":[60],"defender":[61],"select":[64],"security":[66],"level":[67],"adjust":[69],"operations":[71],"of":[72,110],"intrusion":[74],"detection":[75],"system,":[76],"while":[77,89],"optimize":[82],"duration":[85,109],"avoiding":[90],"being":[91],"detected.":[92],"our":[94],"model,":[95],"we":[96],"consider":[97],"time-dependent":[98],"cost/reward":[99],"metrics":[100],"for":[101],"players":[103],"are":[105],"driven":[106],"collocation.":[112],"We":[113],"obtain":[114],"Nash":[116],"equilibrium":[117],"solution":[118],"game":[121,139],"under":[122],"existence":[123],"conditions.":[124],"Our":[125],"numerical":[126],"results":[127],"validate":[128],"theoretical":[130],"findings":[131],"illustrate":[133],"tradeoffs":[135],"inherent":[136],"players.":[140]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
