Login / Signup
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
Yan Solihin
Published in:
USENIX Security Symposium (2019)
Keyphrases
</>
encryption key
ibm zenterprise
operating system
storage devices
encryption scheme
virtual machine
input output
high availability
worst case scenario
wireless sensor networks
data sharing
standard model
dos attacks
encryption algorithm
storage management
encryption decryption