Extracting Secrets from Encrypted Virtual Machines.
Mathias MorbitzerManuel HuberJulian HorschPublished in: CODASPY (2019)
Keyphrases
- virtual machine
- operating system
- data center
- computing resources
- distributed computing
- application level
- cloud computing environment
- low latency
- cloud computing
- multi tasking
- database
- java virtual machine
- database systems
- privacy preserving
- data mining techniques
- limited resources
- software development
- programming language
- management system
- optimal allocation
- java card
- e learning
- network access
- information systems