TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Mengyuan LiYinqian ZhangHuibo WangKang LiYueqiang ChengPublished in: ACSAC (2021)
Keyphrases
- security mechanisms
- secure routing
- cryptographic protocols
- stream cipher
- operating system
- security protocols
- encryption key
- chosen plaintext
- encryption decryption
- security issues
- security measures
- cloud computing
- cryptographic algorithms
- security threats
- encryption scheme
- security flaws
- stepping stones
- remote user authentication scheme
- advanced encryption standard
- countermeasures
- block cipher
- unauthorized access
- virtual machine
- standard model
- watermarking scheme
- security requirements
- encryption algorithm
- lightweight
- ad hoc networks
- information leakage
- resource constrained
- authentication scheme
- ciphertext
- authentication protocol
- security analysis
- key management
- smart card
- routing protocol
- service providers
- data security
- chosen plaintext attack
- sensitive data
- access control