Liu F,Yarom Y,Ge Q,et al.Last-level cache sidechannel attacks are practical[C]//IEEE Symposium on Security&Privacy,2015:605-622.
[2]
郑兴杰.基于SMP架构的半虚拟化CPU调度算法[D].哈尔滨:哈尔滨工程大学,2009:19-33.Zheng Xingjie.Research on CPU scheduler of paravirtualization based on SMP architecture[D].Harbin:Harbin Engineering University,2009:19-33.
[3]
Barham P,Dragovic B,Fraser K,et al.Xen and the art of virtualization[J].Acm Sigops Operating Systems Review,2003,37(5):164-177.
[4]
Duda K J,Cheriton D R.Borrowed-virtual-time(BVT)scheduling:supporting latency-sensitivethreads in a general-purpose scheduler[J].Acm Sigops Operating Systems Review,2000,34(2):27-28.
[5]
Elewi A M,Awadalla M H A,Eladawy M I.Energy efficient real time scheduling of dependent tasks sharing resources[C]//Geoffrey Fox.Proceedings of the2008High Performance Computing&Simulation Conference,Nicosia,Cyprus:Waleed W.Smari,2008:107-116.
[6]
张天宇,关楠,邓庆绪.Xen虚拟机Credit调度算法的实时性能分析[J].计算机科学,2015,42(12):115-119.Zhang Tianyu,Guan Nan,Deng Qingxu.Analysis of real-time performance of algorithm credit in Xen virtual machine[J].Computer Science,2015,42(12):115-119.
[7]
Kannan P.A study on virtualization techniques and challenges in cloud computing[J].International Journal of Scientific&Technology Research,2014,11(3):147-151.
Wang Z,Lee R B.Covert and side channels due to processor architecture[C]//Computer Security Applications Conference.IEEE Computer Society,2006:473-482.
[10]
Muthunagai S U,Karthic C D,Sujatha S.Efficient access of cloud resources through virtualization techniques[C]//International Conference on Recent Trends in Information Technology,2012:174-178.
[11]
Ristenpart T,Tromer E,Shacham H,et al.Get off my cloud:exploring information leakage in Third-Party compute clouds[C]//ACM Conference on Computer and Communications Security,CCS 2009,Chicago,Illinois,Usa,November,2009:199-212.
[12]
Xu Y,Bailey M,Jahanian F,et al.An exploration of L2cache covert channels in virtualized environments[C]//ACM Cloud Computing Security Workshop,CCSW 2011,Chicago,USA,October,2011:29-40.
[13]
Wu Z,Xu Z,Wang H.Whispers in the hyper-space:high-bandwidth and reliable covert channel attacks inside the cloud[J].IEEE/ACM Transactions on Networking,2015,23(2):603-615.
[14]
Matthews J N,Dow E M,Deshane T,et al.Running Xen:A Hands-On Guide to the Art of Virtualization[M].Prentice Hall PTR,2008:10-34.
[15]
Percival C.Cache missing for fun and profit[C]//Proceedings of the BSDCan,2005.URL:http://people.cs.uchicago.edu/~ftchong/290N-F06/covertcache.pdf.