1. A classification of SQL-injection attacks and countermeasures;Halfond,2006
2. Spectre attacks: exploiting speculative execution;Kocher,2018
3. M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, et al. Meltdown: Reading kernel memory from user space, in: 27th USENIX Security Symposium (USENIX Security 18), 2018, pp. 973–990.
4. Over-encryption: management of access control evolution on outsourced data;De Capitani di Vimercati,2007
5. Cloud security: Emerging threats and current solutions;Coppolino;Comput. Electr. Eng.,2017