{"id":"https://openalex.org/W2600769197","doi":"https://doi.org/10.1145/3052973.3052978","title":"DoS Attacks on Your Memory in Cloud","display_name":"DoS Attacks on Your Memory in Cloud","publication_year":2017,"publication_date":"2017-03-31","ids":{"openalex":"https://openalex.org/W2600769197","doi":"https://doi.org/10.1145/3052973.3052978","mag":"2600769197"},"language":"en","primary_location":{"id":"doi:10.1145/3052973.3052978","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3052973.3052978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101591102","display_name":"Tianwei Zhang","orcid":"https://orcid.org/0000-0001-7335-7367"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianwei Zhang","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035657440","display_name":"Ruby B. Lee","orcid":"https://orcid.org/0000-0001-9497-0777"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruby B. Lee","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101591102"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":4.1492,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.95138971,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"253","last_page":"265"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8340812921524048},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7733663320541382},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5277988314628601},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5251369476318359},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.520100474357605},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4944167137145996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4581637978553772},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.45384615659713745},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.44753411412239075},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.44191431999206543},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.41501784324645996},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35110461711883545},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.272693395614624},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24179276823997498}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8340812921524048},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7733663320541382},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5277988314628601},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5251369476318359},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.520100474357605},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4944167137145996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4581637978553772},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.45384615659713745},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.44753411412239075},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44191431999206543},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.41501784324645996},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35110461711883545},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.272693395614624},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24179276823997498}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3052973.3052978","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3052973.3052978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G994159362","display_name":null,"funder_award_id":"CNS-1218817","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W35888908","https://openalex.org/W43148069","https://openalex.org/W1467126665","https://openalex.org/W1504046403","https://openalex.org/W1533145153","https://openalex.org/W1584476834","https://openalex.org/W1586201613","https://openalex.org/W1934458198","https://openalex.org/W1967994051","https://openalex.org/W1987459411","https://openalex.org/W1992291252","https://openalex.org/W2000429806","https://openalex.org/W2001759130","https://openalex.org/W2004301625","https://openalex.org/W2017004353","https://openalex.org/W2023214828","https://openalex.org/W2037195664","https://openalex.org/W2037322308","https://openalex.org/W2072741153","https://openalex.org/W2073396175","https://openalex.org/W2093941454","https://openalex.org/W2098278566","https://openalex.org/W2102709380","https://openalex.org/W2109720953","https://openalex.org/W2116271549","https://openalex.org/W2117552630","https://openalex.org/W2119028650","https://openalex.org/W2129573249","https://openalex.org/W2136282185","https://openalex.org/W2142875853","https://openalex.org/W2166481425","https://openalex.org/W2167088175","https://openalex.org/W2200264815","https://openalex.org/W2952203331","https://openalex.org/W4210790398","https://openalex.org/W4240262711","https://openalex.org/W4254194613","https://openalex.org/W6684661360","https://openalex.org/W6687973968"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W1973516247","https://openalex.org/W2179519055","https://openalex.org/W1991063492","https://openalex.org/W2743348030","https://openalex.org/W2145292010","https://openalex.org/W2747005099","https://openalex.org/W2086039693"],"abstract_inverted_index":{"In":[0],"cloud":[1,56,75,135,228],"computing,":[2],"network":[3],"Denial":[4,39],"of":[5,40,44,123,201],"Service":[6,41],"(DoS)":[7],"attacks":[8,20,37,46,140,242],"are":[9,31,38,82],"well":[10,33],"studied":[11],"and":[12,88,151,186,206],"defenses":[13],"have":[14],"been":[15],"implemented,":[16],"but":[17],"severe":[18,143],"DoS":[19,36,176,241],"on":[21,54,101,125,225],"a":[22,27,55,93,97,133,147,179,198,222],"victim's":[23],"working":[24,113],"memory":[25,52,61,80,114,127,175,240],"by":[26,48,69,85,92,197],"single":[28],"hostile":[29,98],"VM":[30,99],"not":[32],"understood.":[34],"Memory":[35],"(or":[42],"Degradation":[43],"Service)":[45],"caused":[47],"contention":[49,124],"for":[50,64,146,157,210,214],"hardware":[51,79,203],"resources":[53],"server.":[57],"Despite":[58],"the":[59,70,77,86,102,106,110,112,121,162,191,226],"strong":[60],"isolation":[62],"techniques":[63],"virtual":[65],"machines":[66],"(VMs)":[67],"enforced":[68],"software":[71],"virtualization":[72],"layer":[73],"in":[74,96,154,161],"servers,":[76],"underlying":[78],"layers":[81],"still":[83],"shared":[84],"VMs":[87],"can":[89,137,237],"be":[90],"exploited":[91],"clever":[94],"attacker":[95],"co-located":[100],"same":[103],"server":[104],"as":[105],"victim":[107,111],"VM,":[108],"denying":[109],"he":[115],"needs.":[116],"We":[117,129,194,220],"first":[118],"show":[119,131,232],"quantitatively":[120],"severity":[122],"different":[126],"resources.":[128],"then":[130],"that":[132,233],"malicious":[134],"customer":[136],"mount":[138],"low-cost":[139],"to":[141,182,189],"cause":[142],"performance":[144,204,216,245],"degradation":[145],"Hadoop":[148],"distributed":[149],"application,":[150],"38X":[152],"delay":[153],"response":[155],"time":[156],"an":[158,169],"E-commerce":[159],"website":[160],"Amazon":[163],"EC2":[164],"cloud.":[165],"Then,":[166],"we":[167],"design":[168],"effective,":[170],"new":[171],"defense":[172,235],"against":[173],"these":[174],"attacks,":[177],"using":[178],"statistical":[180],"metric":[181],"detect":[183],"their":[184],"existence":[185],"execution":[187],"throttling":[188],"mitigate":[190],"attack":[192],"damage.":[193],"achieve":[195],"this":[196,234],"novel":[199],"re-purposing":[200],"existing":[202],"counters":[205],"duty":[207],"cycle":[208],"modulation":[209],"security,":[211],"rather":[212],"than":[213],"improving":[215],"or":[217],"power":[218],"consumption.":[219],"implement":[221],"full":[223],"prototype":[224],"OpenStack":[227],"system.":[229],"Our":[230],"evaluations":[231],"system":[236],"effectively":[238],"defeat":[239],"with":[243],"negligible":[244],"overhead.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
