Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Jie WangKun SunLingguang LeiShengye WanYuewu WangJiwu JingPublished in: CCS (2020)
Keyphrases
- sensitive data
- malicious users
- protection mechanisms
- security threats
- unauthorized access
- privacy preserving
- smart card
- data storage
- sensitive information
- data sharing
- third party
- information security
- privacy protection
- data confidentiality
- personal data
- privacy preservation
- data privacy
- main memory
- security issues
- data publishing
- data access
- query processing
- peer to peer
- database management systems
- databases
- data management
- data warehouse
- high dimensional