Author:
Gueron Shay,Seifert Jean-Pierre
Publisher
Springer Berlin Heidelberg
Reference46 articles.
1. Advanced Micro Devices, Pacifica — AMD Secure Virtual Machine Architecture Reference Manual, AMD (2005)
2. Attanasio, C.R.: Virtual Machines and Data Security. In: Proceedings of the Workshop on Virtual Computer Systems, pp. 206–209 (1973)
3. Bernstein, D.J.: Cache-timing attacks on AES, 37 pages (2005), http://cr.yp.to/papers.html/cachetiming
4. Bishop, M.: Computer Security: Art and Science. Addison Wesley Professional, Reading (2003)
5. Carpenter, M., Liston, T., Skoudis, E.: Hiding Virtualization from Attackers and Malware. IEEE Security and Privacy 5(3), 62–65 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to Escape From the Simulation;Seeds of Science;2023-03
2. Virtualization;ACM Computing Surveys;2013-02