Login / Signup
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Jietao Xiao
Nanzi Yang
Wenbo Shen
Jinku Li
Xin Guo
Zhiqiang Dong
Fei Xie
Jianfeng Ma
Published in:
USENIX Security Symposium (2023)
Keyphrases
</>
cooperative
countermeasures
overlay network
database
data mining
network layer
terrorist attacks
attack detection
digital image watermarking