Login / Signup
Heckler: Breaking Confidential VMs with Malicious Interrupts.
Benedict Schlüter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
Published in:
CoRR (2024)
Keyphrases
</>
virtual machine
numerical data
statistical databases
malicious attacks
inference control
detect malicious
original data
malicious behavior
confidential information
sensitive data
malicious users
operating system
real time
neural network
cost effective