ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2403.10296
  4. Cited By
Formal Security Analysis of the AMD SEV-SNP Software Interface
v1v2v3v4v5 (latest)

Formal Security Analysis of the AMD SEV-SNP Software Interface

IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
15 March 2024
Petar Paradzik
Ante Derek
Marko Horvat
ArXiv (abs)PDFHTMLGithub (111★)

Papers citing "Formal Security Analysis of the AMD SEV-SNP Software Interface"

10 / 10 papers shown
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNPIEEE Symposium on Security and Privacy (S&P), 2024
Benedict Schluter
Supraja Sridhara
Andrin Bertschi
Shweta Shinde
216
39
0
04 Apr 2024
Heckler: Breaking Confidential VMs with Malicious Interrupts
Heckler: Breaking Confidential VMs with Malicious InterruptsUSENIX Security Symposium (USENIX Security), 2024
Benedict Schluter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
288
46
0
04 Apr 2024
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves
Flexible remote attestation of pre-SNP SEV VMs using SGX enclavesIEEE Access (IEEE Access), 2023
P. Antonino
Ante Derek
Wojciech Aleksander Wołoszyn
222
8
0
16 May 2023
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's
  Secure Encrypted Virtualization
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted VirtualizationConference on Computer and Communications Security (CCS), 2021
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
271
83
0
10 Aug 2021
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Luca Wilke
Jan Wichelmann
Florian Sieck
T. Eisenbarth
167
17
0
29 Jun 2021
Exploiting Interfaces of Secure Encrypted Virtual Machines
Exploiting Interfaces of Secure Encrypted Virtual Machines
M. Radev
M. Morbitzer
88
16
0
14 Oct 2020
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD
  SEV
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEVConference on Computer and Communications Security (CCS), 2020
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
193
72
0
01 Aug 2020
SEVurity: No Security Without Integrity -- Breaking Integrity-Free
  Memory Encryption with Minimal Assumptions
SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke
Jan Wichelmann
M. Morbitzer
T. Eisenbarth
188
72
0
23 Apr 2020
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Insecure Until Proven Updated: Analyzing AMD SEV's Remote AttestationConference on Computer and Communications Security (CCS), 2019
Robert Buhren
Christian Werling
Jean-Pierre Seifert
177
59
0
30 Aug 2019
SEVered: Subverting AMD's Virtual Machine Encryption
SEVered: Subverting AMD's Virtual Machine Encryption
M. Morbitzer
Manuel Huber
Julian Horsch
Sascha Wessel
113
102
0
24 May 2018
1
Page 1 of 1