B Asvija, R Eswari, MB Bijoy - Computer Networks, 2019 - Elsevier
The advantages of virtualization technology have resulted in its wide spread adoption in cloud computing infrastructures. However it has also introduced a new set of security threats …
The path a packet takes when handled by the Linux Kernel has been well established for a long time. Its overhead/bottleneck issues are also known. Nonetheless, complexity has …
Interference between processes executing on shared hardware can be used to mount performance-degradation attacks. However, in most cases, such attacks offer little benefit for …
G Einziger, R Friedman - … of the 17th International Conference on …, 2016 - dl.acm.org
Counting Bloom filters (CBF) and their variants are data structures that support membership or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory …
B Asvija, R Eswari, MB Bijoy - Journal of Organizational and End …, 2021 - igi-global.com
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial …
B Asvija, R Eswari, MB Bijoy - Journal of Information Security and …, 2020 - Elsevier
Virtualization security is an important aspect to be carefully addressed while provisioning cloud services. In this paper, we propose a novel model using Bayesian Attack Graphs …
Single root I/O virtualization (SRIOV) is a hardware/software interface that allows devices to “self virtualize” and thereby remove the host from the critical I/O path. SRIOV thus brings …
In state-of-the-art design paradigm, time, space and power efficiency are considered the primary design constraints. Quite often, this approach adversely impacts the security of the …
O Sander, T Sandmann, VV Duy, S Bähr… - … , Automation & Test …, 2014 - ieeexplore.ieee.org
Electric/Electronic architectures in modern automobiles evolve towards an hierachical approach where functionalities from several ECUs are consolidated into few domain …