[1] Wendzel S, Zander S, Fechner B, et al. Pattern-based survey and categorization of network covert channel techniques[J]. ACM Computing Surveys, 2015,47(3):Article No. 50.
[2] Maurice C, Neumann C, Heen O, et al. C5: Cross-cores cache covert channel[C]// International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2015:46-64.
[3] Wu Zhenyu, Xu Zhang, Wang Haining. Whispers in the hyper-space: High-bandwidth and reliable covert channel attacks inside the cloud[J]. IEEE/ACM Transactions on Networking (TON), 2015,23(2):603-615.
[4] Wu Jingzheng, Ding Liping, Wu Yanjun, et al. C2Detector: A covert channel detection framework in cloud computing[J]. Security and Communication Networks, 2014,7(3):544-557.
[5] Wu Zhenyu, Xu Zhang, Wang Haining. Whispers in the hyper-space: High-speed covert channel attacks in the cloud[C]// Proceedings of the 21st USENIX Conference on Security Symposium. 2012:159-173.
[6] Wu Jing zheng, Wang Yongji, Ding Liping, et al. Improving performance of network covert timing channel through huffman coding[C]// The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing. 2012:69-79.
[7] Wu Jingzheng, Ding Liping, Wang Yongji, et al. Identification and evaluation of sharing memory covert timing channel in Xen virtual machines[C]// Proceedings of the 4th IEEE International Conference on Cloud Computing. 2011:283-291.
[8] Park Younghee, Chang Sang-Yoon, Krishnamurthy L M. Watermarking for detecting freeloader misbehavior in software-defined networks[C]// 2016 International Conference on Computing, Networking and Communications. 2016:1-6.
[9] Scott-Hayward S, O’Callaghan G, Sezer S. SDN security: A survey[C]// 2013 IEEE SDN For Future Networks and Services. 2013:1-7.
[10]Sezer S, Scott-Hayward S, Chouhan P K, et al. Are we ready for SDN? Implementation challenges for software-defined networks[J]. IEEE Communications Magazine, 2013,51(7):36-43.
[11]Shin Seungwon, Gu Guofei. Attacking software-defined networks: A first feasibility study[C]// Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013:165-166.
[12]Kreutz D, Ramos F, Verissimo P. Towards secure and dependable software-defined networks[C]// Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013:55-60.
[13]Kloti R, Kotronis V, Smith P. OpenFlow: A security analysis[C]// Proceedings of the 21st IEEE International Conference on Network Protocols. 2013:1-6.
[14]戴彬,王航远,徐冠,等. SDN安全探讨:机遇与威胁并存[J]. 计算机应用研究, 2014,31(8):2254-2262.
[15]Jose T, Kurian J. Survey on SDN security mechanisms[J]. International Journal of Computer Applications, 2015,132(14):.32-35.
[16]Hussein A, Elhajj I H, Chehab A, et al. SDN security plane: An architecture for resilient security services[C]// IEEE International Conference on Cloud Engineering Workshop. 2016:54-59.
[17]Shah G, Molina A, Blaze M. Keyboards and covert channels[C]// Proceedings of the 15th conference on USENIX Security Symposium. 2006: Article No. 5.
|