ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2403.10296
  4. Cited By
Formal Security Analysis of the AMD SEV-SNP Software Interface
v1v2v3v4v5 (latest)

Formal Security Analysis of the AMD SEV-SNP Software Interface

IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
15 March 2024
Petar Paradzik
Ante Derek
Marko Horvat
ArXiv (abs)PDFHTML

Papers citing "Formal Security Analysis of the AMD SEV-SNP Software Interface"

10 / 10 papers shown
Title
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNPIEEE Symposium on Security and Privacy (S&P), 2024
Benedict Schluter
Supraja Sridhara
Andrin Bertschi
Shweta Shinde
146
35
0
04 Apr 2024
Heckler: Breaking Confidential VMs with Malicious Interrupts
Heckler: Breaking Confidential VMs with Malicious InterruptsUSENIX Security Symposium (USENIX Security), 2024
Benedict Schluter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
196
38
0
04 Apr 2024
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves
Flexible remote attestation of pre-SNP SEV VMs using SGX enclavesIEEE Access (IEEE Access), 2023
P. Antonino
Ante Derek
Wojciech Aleksander Wołoszyn
147
7
0
16 May 2023
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's
  Secure Encrypted Virtualization
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted VirtualizationConference on Computer and Communications Security (CCS), 2021
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
196
77
0
10 Aug 2021
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation
Luca Wilke
Jan Wichelmann
Florian Sieck
T. Eisenbarth
93
18
0
29 Jun 2021
Exploiting Interfaces of Secure Encrypted Virtual Machines
Exploiting Interfaces of Secure Encrypted Virtual Machines
M. Radev
M. Morbitzer
65
17
0
14 Oct 2020
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD
  SEV
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEVConference on Computer and Communications Security (CCS), 2020
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
141
70
0
01 Aug 2020
SEVurity: No Security Without Integrity -- Breaking Integrity-Free
  Memory Encryption with Minimal Assumptions
SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Luca Wilke
Jan Wichelmann
M. Morbitzer
T. Eisenbarth
166
72
0
23 Apr 2020
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Insecure Until Proven Updated: Analyzing AMD SEV's Remote AttestationConference on Computer and Communications Security (CCS), 2019
Robert Buhren
Christian Werling
Jean-Pierre Seifert
120
57
0
30 Aug 2019
SEVered: Subverting AMD's Virtual Machine Encryption
SEVered: Subverting AMD's Virtual Machine Encryption
M. Morbitzer
Manuel Huber
Julian Horsch
Sascha Wessel
90
100
0
24 May 2018
1