Bypassing Full Disk Encryption with Virtual Machine Introspection.
Yacine HebbalPublished in: AICCSA (2019)
Keyphrases
- virtual machine
- operating system
- data center
- main memory
- computing resources
- distributed computing
- virtual memory
- low latency
- cloud computing environment
- secret key
- multi tasking
- java card
- encryption algorithm
- key management
- encryption scheme
- data analysis
- random access
- storage systems
- data structure
- index structure
- security protocols
- low cost
- query processing
- java virtual machine
- information systems
- database