Cross-VM cache attacks on Camellia.
Milad SeddighHadi SoleimanyPublished in: J. Comput. Virol. Hacking Tech. (2022)
Keyphrases
- virtual machine
- prefetching
- countermeasures
- security threats
- watermarking scheme
- malicious attacks
- main memory
- data mining
- virtual memory
- back end
- denial of service attacks
- query processing
- caching scheme
- cooperative
- hit rate
- traffic analysis
- memory hierarchy
- cache replacement
- multithreading
- access patterns
- data access
- operating system
- intrusion detection
- information systems