Cross-VM micro-architectural covert channel attacks in L1 cache
In virtualized platforms, virtual machines are logically isolated by privileged hypervisors. These hypervisors provide abstraction and prevent virtual machines or processes from communicating with one another. Although the prevention of direct communication is enforced by these privileged hypervisor...
Saved in:
Main Author: | Ng, Joel Wei Jie |
---|---|
Other Authors: | Zhang Tianwei |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148686 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Synthesis of covert actuator and sensor attackers
by: Lin, Liyong, et al.
Published: (2022) -
Synthesis of covert actuator attackers for free
by: Lin, Liyong, et al.
Published: (2022) -
Synthesis of covert actuator and sensor attackers as supervisor synthesis
by: Lin, Liyong, et al.
Published: (2021) -
Synthesis of optimal covert sensor–actuator attackers for discrete-event systems
by: Tai, Ruochen, et al.
Published: (2023) -
Synthesis of the supremal covert attacker against unknown supervisors by using observations
by: Tai, Ruochen, et al.
Published: (2023)