4.7 Article

Detecting Hardware-Assisted Virtualization With Inconspicuous Features

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Security in hardware assisted virtualization for cloud computing-State of the art issues and challenges

B. Asvija et al.

COMPUTER NETWORKS (2019)

Proceedings Paper Computer Science, Theory & Methods

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU

Pietro Frigo et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Article Computer Science, Software Engineering

ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks

Zelalem Birhanu Aweke et al.

ACM SIGPLAN NOTICES (2016)

Article Computer Science, Artificial Intelligence

Real time detection of cache-based side-channel attacks using hardware performance counters

Marco Chiappetta et al.

APPLIED SOFT COMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

Last-Level Cache Side-Channel Attacks are Practical

Fangfei Liu et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Proceedings Paper Computer Science, Theory & Methods

S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing-and its Application to AES

Gorka Irazoqui et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)