Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2008.00146
Cited By
v1
v2 (latest)
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
1 August 2020
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV"
9 / 9 papers shown
Title
Formal Security Analysis of the AMD SEV-SNP Software Interface
Petar Paradzik
Ante Derek
Marko Horvat
80
1
0
15 Mar 2024
SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke
Jan Wichelmann
M. Morbitzer
T. Eisenbarth
41
66
0
23 Apr 2020
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
92
424
0
14 May 2019
Extracting Secrets from Encrypted Virtual Machines
M. Morbitzer
Manuel Huber
Julian Horsch
38
42
0
07 Jan 2019
SEVered: Subverting AMD's Virtual Machine Encryption
M. Morbitzer
Manuel Huber
Julian Horsch
Sascha Wessel
34
92
0
24 May 2018
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
87
2,190
0
03 Jan 2018
Secure Encrypted Virtualization is Unsecure
Zhao-Hui Du
Zhiwei Ying
Zhenke Ma
Yufei Mai
P. Wang
Jesse Liu
Jesse Fang
45
44
0
14 Dec 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
Robert Buhren
S. Gueron
Jan C. Nordholz
Jean-Pierre Seifert
Julian Vetter
SILM
25
24
0
12 Dec 2016
Security Analysis of Encrypted Virtual Machines
Felicitas Hetzelt
Robert Buhren
36
73
0
04 Dec 2016
1