
[7] Amittai Aviram, Shu-Chun Weng, Sen Hu, and Bryan Ford.
Efficient system-enforced deterministic parallelism. In Pro-
ceedings of the 9th USENIX Conference on Operating Systems
Design and Implementation, pages 1–16. USENIX Associa-
tion, 2010.
[8] Jens Axboe. FIO-flexible IO tester. http://freecode.
com/projects/fio.
[9] James Matthew Barrie. Peter and Wendy. Hodder &
Stoughton, 1911.
[10] Daniel J Bernstein. Cache-timing attacks on AES,
2005. http://cr.yp.to/antiforgery/
cachetiming-20050414.pdf.
[11] Christian Bienia. Benchmarking Modern Multiprocessors.
PhD thesis, Princeton University, January 2011.
[12] David Brumley and Dan Boneh. Remote timing attacks are
practical. In Proceedings of the 12th Conference on USENIX
Security Symposium-Volume 12. USENIX Association, 2003.
[13] Serdar Cabuk, Carla E Brodley, and Clay Shields. IP covert
timing channels: Design and detection. In Proceedings of
the 11th ACM Conference on Computer and Communications
Security, pages 178–187. ACM, 2004.
[14] Ang Chen, W Brad Moore, Hanjun Xiao, Andreas Haeberlen,
Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou. De-
tecting covert timing channels with time-deterministic replay.
In USENIX Symposium on Operating System Design and Im-
plementation (OSDI), 2014.
[15] Brian F Cooper, Adam Silberstein, Erwin Tam, Raghu Ra-
makrishnan, and Russell Sears. Benchmarking cloud serving
systems with YCSB. In Proceedings of the 1st ACM Sympo-
sium on Cloud Computing, pages 143–154. ACM, 2010.
[16] Joseph Devietti, Brandon Lucia, Luis Ceze, and Mark Oskin.
DMP: Deterministic shared memory multiprocessing. In ACM
SIGARCH Computer Architecture News, volume 37, pages
85–96. ACM, 2009.
[17] Djellel Eddine Difallah, Andrew Pavlo, Carlo Curino, and
Philippe Cudre-Mauroux. OLTP-Bench: An extensible
testbed for benchmarking relational databases. Proceedings
of the VLDB Endowment, 7(4), 2013.
[18] Yaozu Dong, Xiaowei Yang, Jianhui Li, Guangdeng Liao, Kun
Tian, and Haibing Guan. High performance network virtu-
alization with SR-IOV. Journal of Parallel and Distributed
Computing, 72(11):1471–1480, 2012.
[19] George W. Dunlap et al. ReVirt: Enabling intrusion analysis
through virtual-machine logging and replay. In 5th USENIX
Symposium on Operating Systems Design and Implementation
(OSDI), December 2002.
[20] George W Dunlap, Dominic G Lucchetti, Michael A Fetter-
man, and Peter M Chen. Execution replay of multiproces-
sor virtual machines. In Proceedings of the 4th ACM SIG-
PLAN/SIGOPS International Conference on Virtual Execu-
tion Environments, pages 121–130. ACM, 2008.
[21] Edward W Felten and Michael A Schneider. Timing attacks
on web privacy. In Proceedings of the 7th ACM conference on
Computer and communications security, pages 25–32. ACM,
2000.
[22] Steven Gianvecchio and Haining Wang. Detecting covert tim-
ing channels: an entropy-based approach. In Proceedings of
the 14th ACM Conference on Computer and Communications
Security, pages 307–316. ACM, 2007.
[23] J Giles and B Hajek. An information-theoretic and game-
theoretic study of timing channels. IEEE Transactions on
Information Theory, 48(9):2455–2477, 2002.
[24] Liang Gu, Alexander Vaynberg, Bryan Ford, Zhong Shao,
and David Costanzo. CertiKOS: A certified kernel for secure
cloud computing. In Proceedings of the Second Asia-Pacific
Workshop on Systems, 2011.
[25] Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan.
Differential privacy under fire. In 20th Proceedings of
USENIX Security Symposium (USENIX Security), August
2011.
[26] Wei-Ming Hu. Reducing timing channels with fuzzy time. In
IEEE Symposium on Security and Privacy, pages 8–20, 1991.
[27] Marieke Huisman, Pratik Worah, and Kim Sunesen. A tem-
poral logic characterisation of observational determinism. In
IEEE 19th computer Security Foundation Workshop (CSFW),
July 2006.
[28] Ralf Hund, Carsten Willems, and Thorsten Holz. Practical
timing side channel attacks against kernel space ASLR. In
IEEE Symposium on Security and Privacy, pages 191–205.
IEEE, 2013.
[29] Gerry Kane. PA-RISC 2.0 Architecture. Prentice Hall PTR,
1996.
[30] Richard A. Kemmerer. Shared resource matrix methodol-
ogy: An approach to identifying storage and timing channels.
Transactions on Computer Systems (TOCS), 1(3):256–277,
August 1983.
[31] Avi Kivity, Yaniv Kamay, Dor Laor, Uri Lublin, and Anthony
Liguori. KVM: The Linux virtual machine monitor. In
Proceedings of the Linux Symposium, volume 1, pages 225–
230, 2007.
[32] Paul Kocher. Timing attacks on implementations of Diffie-
Hellman, RSA, DSS, and other systems. In Advances in
Cryptology (CRYPTO), pages 104–113. Springer, 1996.
[33] Alexey Kopytov. SysBench: A system performance bench-
mark. http://sysbench.sourceforge.net.
[34] Peng Li, Debin Gao, and Michael K Reiter. StopWatch:
a cloud architecture for timing channel mitigation. ACM
Transactions on Information and System Security (TISSEC),
17(2):8, 2014.
[35] Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza
Sadeghi, Steffen Schulz, and Stefan Katzenbeisser. Hide and
seek in time – Robust covert timing channels. In 14th Eu-
ropean Symposium on Research in Computer Security (ES-
ORICS), September 2009.
[36] Gil Neiger, Amy Santoni, Felix Leung, Dion Rodgers, and
Rich Uhlig. Intel virtualization technology: Hardware sup-
port for efficient processor virtualization. Intel Technology
Journal, 10(3), 2006.
[37] Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, and
Vincent Rijmen. A side-channel analysis resistant description