ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2108.04575
  4. Cited By
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's
  Secure Encrypted Virtualization
v1v2v3v4 (latest)

One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

10 August 2021
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
ArXiv (abs)PDFHTML

Papers citing "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization"

12 / 12 papers shown
Title
Formal Security Analysis of the AMD SEV-SNP Software Interface
Formal Security Analysis of the AMD SEV-SNP Software Interface
Petar Paradzik
Ante Derek
Marko Horvat
78
1
0
15 Mar 2024
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Luca Wilke
Jan Wichelmann
Florian Sieck
T. Eisenbarth
37
18
0
29 Jun 2021
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
M. Morbitzer
Sergej Proskurin
M. Radev
Marko Dorfhuber
Erick Quintanar Salas
115
31
0
28 May 2021
Exploiting Interfaces of Secure Encrypted Virtual Machines
Exploiting Interfaces of Secure Encrypted Virtual Machines
M. Radev
M. Morbitzer
23
14
0
14 Oct 2020
SEVurity: No Security Without Integrity -- Breaking Integrity-Free
  Memory Encryption with Minimal Assumptions
SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke
Jan Wichelmann
M. Morbitzer
T. Eisenbarth
36
66
0
23 Apr 2020
V0LTpwn: Attacking x86 Processor Integrity from Software
V0LTpwn: Attacking x86 Processor Integrity from Software
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
A. Sadeghi
52
90
0
10 Dec 2019
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Robert Buhren
Christian Werling
Jean-Pierre Seifert
50
51
0
30 Aug 2019
Injecting Software Vulnerabilities with Voltage Glitching
Injecting Software Vulnerabilities with Voltage Glitching
Yifan Lu
19
9
0
14 Feb 2019
Extracting Secrets from Encrypted Virtual Machines
Extracting Secrets from Encrypted Virtual Machines
M. Morbitzer
Manuel Huber
Julian Horsch
33
42
0
07 Jan 2019
SEVered: Subverting AMD's Virtual Machine Encryption
SEVered: Subverting AMD's Virtual Machine Encryption
M. Morbitzer
Manuel Huber
Julian Horsch
Sascha Wessel
34
91
0
24 May 2018
Secure Encrypted Virtualization is Unsecure
Secure Encrypted Virtualization is Unsecure
Zhao-Hui Du
Zhiwei Ying
Zhenke Ma
Yufei Mai
P. Wang
Jesse Liu
Jesse Fang
45
44
0
14 Dec 2017
Security Analysis of Encrypted Virtual Machines
Security Analysis of Encrypted Virtual Machines
Felicitas Hetzelt
Robert Buhren
36
73
0
04 Dec 2016
1