Remote Memory-Deduplication Attacks.
Martin SchwarzlErik KraftMoritz LippDaniel GrussPublished in: CoRR (2021)
Keyphrases
- data corruption
- memory requirements
- memory size
- countermeasures
- malicious attacks
- neural network
- random access
- security mechanisms
- attack detection
- traffic analysis
- memory space
- memory usage
- watermarking scheme
- main memory
- data mining
- data cleaning
- computer security
- limited memory
- security threats
- virtual machine
- virtual memory
- network traffic
- terrorist attacks
- information systems