
[2] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage,
“Hey, you, get off of my cloud: Exploring information
leakage in third-party compute clouds,” in 16th ACM
CCS, 2009.
[3] J. Domingo-Ferrer and V. Torra, “Median-based aggre-
gation operators for prototype construction in ordinal
scales,” Intern. J. Intel. Sys., vol. 18, no. 6, 2003.
[4] M. E. Kabir and H. Wang, “Microdata protection method
through microaggregation: A median-based approach,”
Information Security J.: A Global Perspective, vol. 20,
2011.
[5] W.-M. Hu, “Reducing timing channels with fuzzy time,”
in 1991 IEEE Symp. Security & Privacy, 1991.
[6] J. Agat, “Transforming out timing leaks,” in 27th ACM
POPL, 2000.
[7] S. Zdancewic and A. C. Myers, “Observational deter-
minism for concurrent program security,” in 16th IEEE
CSFW, 2003.
[8] D. Zhang, A. Askarov, and A. C. Myers, “Language-
based control and mitigation of timing channels,” in 33rd
ACM PLDI, 2012.
[9] E. Tromer, D. A. Osvik, and A. Shamir, “Efficient cache
attacks on AES, and countermeasures,” J. Cryptology,
vol. 23, no. 1, 2010.
[10] H. Raj, R. Nathuji, A. Singh, and P. England, “Resource
management for isolation enhanced cloud services,” in
ACM CCSW, 2009.
[11] T. Kim, M. Peinado, and G. Mainar-Ruiz, “STEALTH-
MEM: System-level protection against cache-based side
channel attacks in the cloud,” in 21st USENIX Security
Symp., 2012.
[12] A. Askarov, A. C. Myers, and D. Zhang, “Predictive
black-box mitigation of timing channels,” in 17th ACM
CCS, 2010.
[13] B. C. Vattikonda, S. Das, and H. Shacham, “Eliminating
fine grained timers in Xen,” in ACM CCSW, 2011.
[14] M. H. Kang and I. S. Moskowitz, “A pump for rapid,
reliable, secure communication,” in ACM CCS, 1993.
[15] J. Giles and B. Hajek, “An information-theoretic and
game-theoretic study of timing channels,” IEEE TOIT,
vol. 48, no. 9, 2002.
[16] A. Haeberlen, B. C. Pierce, and A. Narayan, “Differential
privacy under fire,” in 20th USENIX Security Symp.,
2011.
[17] D. Zhang, A. Askarov, and A. C. Myers, “Predictive
mitigation of timing channels in interactive systems,” in
18th ACM CCS, 2011.
[18] F. B. Schneider, “Implementing fault-tolerant services
using the state machine approach: A tutorial,” ACM
Comp. Surv., vol. 22, no. 4, 1990.
[19] A. Borg, W. Blau, W. Graetsch, F. Herrmann, and
W. Oberle, “Fault tolerance under UNIX,” ACM TOCS,
vol. 7, no. 1, 1989.
[20] P. Narasimhan, L. E. Moser, and P. M. Melliar-Smith,
“Enforcing determinism for the consistent replication
of multithreaded CORBA applications,” in IEEE SRDS,
1999.
[21] C. Basile, Z. Kalbarczyk, and R. K. Iyer, “Active replica-
tion of multithreaded applications,” IEEE TPDS, vol. 17,
no. 5, 2006.
[22] T. C. Bressoud and F. B. Schneider, “Hypervisor-based
fault-tolerance,” ACM TOCS, vol. 14, no. 1, 1996.
[23] F. B. Schneider, “Understanding protocols for Byzantine
clock synchronization,” Department of Computer Sci-
ence, Cornell University, Tech. Rep. 87-859, 1987.
[24] D. Gao, M. K. Reiter, and D. Song, “Behavioral distance
for intrusion detection,” in 8th RAID, 2005.
[25] B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu,
J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser,
“N-variant systems: A secretless framework for security
through diversity,” in 15th USENIX Security Symp., 2006.
[26] A. Nguyen-Tuong, D. Evans, J. C. Knight, B. Cox,
and J. W. Davidson, “Security through redundant data
diversity,” in 38th DSN, 2008.
[27] D. Gao, M. K. Reiter, and D. Song, “Beyond output
voting: Detecting compromised replicas using HMM-
based behavioral distance,” IEEE TDSC, vol. 6, no. 2,
2009.
[28] M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and
B. Weissman, “ReTrace: Collecting execution trace with
virtual machine deterministic replay,” in 3rd Workshop
on Modeling, Benchmarking and Simulation, 2007.
[29] G. W. Dunlap, D. G. Lucchetti, P. M. Chen, and M. A.
Fetterman, “Execution replay of multiprocessor virtual
machines,” in 4th ACM VEE, 2008.
[30] J. Devietti, B. Lucia, L. Ceze, and M. Oskin, “DMP:
Deterministic shared memory multiprocessing,” IEEE
Micro, vol. 30, pp. 41–49, 2010.
[31] A. Aviram, S.-C. Weng, S. Hu, and B. Ford, “Effi-
cient system-enforced deterministic parallelism,” in 9th
USENIX OSDI, 2010.
[32] J. C. Wray, “An analysis of covert timing channels,” in
1991 IEEE Symp. Security & Privacy, 1991.
[33] G. Popek and C. Kline, “Verifiable secure operating
system software,” in AFIPS National Comp. Conf., 1974.
[34] T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido,
“A nonstationary Poisson view of Internet traffic,” in
INFOCOM, 2004.
[35] Timekeeping in VMware Virtual Machines, VMWare Inc.,
2010.
[36] R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. M.
Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H.
Leung, and L. Smith, “Intel virtualization technology,”
IEEE Comp., vol. 38, no. 3, 2005.
[37] Intel 64 and IA-32 Architectures Software Developer’s
Manual, Intel Corporation, 2011.
[38] J. Yin, A. Venkataramani, J.-P. Martin, L.Alvisi, and
M. Dahlin, “Byzantine fault-tolerant confidentiality,” in
Inter. Workshop on Future Directions in Distributed Com-
puting, 2002.
[39] T. Speakman, et al., “PGM reliable transport protocol
specification,” Request for Comments 3208, Internet En-
gineering Task Force, 2001.
[40] C. Bienia, “Benchmarking modern multiprocessors,”
Ph.D. dissertation, Princeton University, 2011.
[41] D. Horsley, “Maximum packing of the complete graph
with uniform length cycles,” J. Graph Theory, vol. 68,
no. 1, 2011.
[42] C. C. Lindner and C. A. Rodger, Design Theory. CRC
Press, 2008, ch. 1.
[43] E. Deza and M. Deza, Dictionary of Distances. Elsevier,
2006.
[44] M. G¨ung¨or, Y. Bulut, and S. C¸alık, “Distributions of order
statistics,” Appl. Math. Sci., vol. 3, no. 16, 2009.