{"id":"https://openalex.org/W2789826211","doi":"https://doi.org/10.1145/3018896.3065843","title":"Preventing and detecting cache side-channel attacks in cloud computing","display_name":"Preventing and detecting cache side-channel attacks in cloud computing","publication_year":2017,"publication_date":"2017-03-22","ids":{"openalex":"https://openalex.org/W2789826211","doi":"https://doi.org/10.1145/3018896.3065843","mag":"2789826211"},"language":"en","primary_location":{"id":"doi:10.1145/3018896.3065843","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3065843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036299840","display_name":"Younis A. Younis","orcid":"https://orcid.org/0000-0001-8441-4996"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Younis A. Younis","raw_affiliation_strings":["Liverpool John Moores University, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"Liverpool John Moores University, Liverpool, UK","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106182605","display_name":"Kashif Kifayat","orcid":"https://orcid.org/0000-0001-5088-0825"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kashif Kifayat","raw_affiliation_strings":["Liverpool John Moores University, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"Liverpool John Moores University, Liverpool, UK","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113851655","display_name":"Abir Hussain","orcid":null},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abir Hussain","raw_affiliation_strings":["Liverpool John Moores University, Liverpool, UK"],"affiliations":[{"raw_affiliation_string":"Liverpool John Moores University, Liverpool, UK","institution_ids":["https://openalex.org/I63098007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036299840"],"corresponding_institution_ids":["https://openalex.org/I63098007"],"apc_list":null,"apc_paid":null,"fwci":0.8288,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81684395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8107472658157349},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8015427589416504},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7727137804031372},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7149478197097778},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.6442263722419739},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5737826824188232},{"id":"https://openalex.org/keywords/multitenancy","display_name":"Multitenancy","score":0.5443862676620483},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.502870500087738},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49863696098327637},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45492687821388245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.38891398906707764},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3485531210899353},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29476267099380493},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.10182061791419983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8107472658157349},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8015427589416504},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7727137804031372},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7149478197097778},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.6442263722419739},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5737826824188232},{"id":"https://openalex.org/C69016650","wikidata":"https://www.wikidata.org/wiki/Q1364211","display_name":"Multitenancy","level":5,"score":0.5443862676620483},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.502870500087738},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49863696098327637},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45492687821388245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.38891398906707764},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3485531210899353},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29476267099380493},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.10182061791419983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3018896.3065843","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3065843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1427174644","https://openalex.org/W1533145153","https://openalex.org/W1584476834","https://openalex.org/W1740185811","https://openalex.org/W1821583647","https://openalex.org/W1832887889","https://openalex.org/W1934458198","https://openalex.org/W1979999931","https://openalex.org/W1983972467","https://openalex.org/W1992291252","https://openalex.org/W2022869924","https://openalex.org/W2034195502","https://openalex.org/W2056778557","https://openalex.org/W2103289002","https://openalex.org/W2132064685","https://openalex.org/W2142799720","https://openalex.org/W2169461225","https://openalex.org/W2201006485","https://openalex.org/W2275530856","https://openalex.org/W2952620075"],"related_works":["https://openalex.org/W1648925414","https://openalex.org/W2532276243","https://openalex.org/W2128969302","https://openalex.org/W1991841868","https://openalex.org/W3012429193","https://openalex.org/W1968675450","https://openalex.org/W2599243786","https://openalex.org/W3017238380","https://openalex.org/W4281865134","https://openalex.org/W3009375918"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,47,58],"offers":[2],"new":[3],"cost":[4],"effective":[5],"services":[6,31],"on-demand":[7],"such":[8,48],"as":[9,11,16,22,49],"Software":[10],"a":[12,17,23,39,126,197],"service":[13,18,24],"(SaaS),":[14],"Infrastructure":[15],"(IaaS)":[19],"and":[20,34,53,78,96,120,133,176,184,200,211,219],"Platform":[21],"(PaaS).":[25],"However,":[26],"with":[27,44],"all":[28],"of":[29,41,106,128],"these":[30,156],"promising":[32],"facilities":[33],"benefits,":[35],"there":[36],"are":[37,87,104,125,228],"still":[38],"number":[40,127],"challenges":[42],"associated":[43],"utilizing":[45],"cloud":[46,57,207],"data":[50,81],"security,":[51],"cyber-attacks,":[52],"multi-tenancy.":[54],"Multi-tenancy":[55],"in":[56,149,206],"has":[59,71],"unique":[60],"vulnerabilities,":[61],"one":[62,105,150],"particular":[63],"issue":[64],"involves":[65],"virtual":[66],"machines":[67],"physical":[68],"co-residency,":[69],"which":[70,103,138,188,227],"been":[72],"exploited":[73],"to":[74,90,116,131,141,165,202,217],"leak":[75],"sensitive":[76,80],"information":[77],"extract":[79],"using":[82],"hardware":[83,92,110],"side-channels.":[84],"Side-channel":[85],"attacks":[86,205],"classified":[88],"according":[89],"the":[91,107,142,153,171,181,191,213,232],"medium":[93],"they":[94],"target":[95],"exploit,":[97],"for":[98],"instance,":[99],"cache":[100,135,147,203],"side-channel":[101,136,148,204],"attacks,":[102,137],"most":[108],"common":[109],"devices":[111],"targeted":[112],"by":[113,146,231],"adversaries":[114],"due":[115,140],"their":[117],"high-rate":[118],"interactions":[119],"sharing":[121],"between":[122],"processes.":[123],"There":[124],"proposed":[129,233],"solutions":[130,157],"detect":[132,166,218],"prevent":[134,220],"failed":[139],"deceived":[143],"normal":[144],"behavior":[145,169],"hand.":[151],"In":[152],"other":[154],"hand,":[155],"mainly":[158],"rely":[159],"on":[160,170],"attached":[161],"software":[162,177],"or":[163],"applications":[164,175],"any":[167],"abnormal":[168],"CPU":[172,182,192],"cache.":[173],"These":[174],"will":[178,189],"slow":[179],"down":[180],"operations":[183],"introduce":[185],"unwanted":[186],"overload,":[187],"affect":[190],"performance.":[193],"This":[194],"paper":[195],"presents":[196],"detailed":[198],"study":[199],"analysis":[201],"computing.":[208],"It":[209,222],"surveys":[210],"reports":[212],"important":[214,225],"directions":[215],"utilized":[216],"them.":[221],"also":[223],"identifies":[224],"gaps,":[226],"not":[229],"fulfilled":[230],"solutions.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
