Menu
|
WikiSandboxhahaSGFXGVVCV
American University of San Diego and MIT researchers recently published papers, exposing potential security weaknesses in cloud computing, through the Cross-VM methods of attack, may lead to a series of security problems.
They use the Amazon's Elastic Compute Cloud (EC2) platform as the main example, combine to use side channel approach, detection and get the relevant information and operation status from the target. |