A. Arcangeli, I. Eidus, and C. Wright, Increasing memory density by using KSM, Linux Symposium, pp.19-28, 2009.

E. Bosman, K. Razavi, H. Bos, and C. Giuffrida, Dedup est machina: Memory deduplication as an advanced exploitation vector, IEEE Symposium on Security and Privacy, pp.987-1004, 2016.

K. Fraser, H. , S. Neugebauer, R. Pratt, I. Warfield et al., Safe hardware access with the xen virtual machine monitor, 2004.

D. Gruss, D. Bidner, and S. Mangard, Practical memory deduplication attacks in sandboxed javascript, ESORICS, Part I, pp.108-122, 2015.

D. Gupta, S. Lee, M. Vrable, S. Savage, A. C. Snoeren et al., Difference engine: harnessing memory redundancy in virtual machines, Commun. ACM, vol.53, issue.10, pp.85-93, 2010.

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side channels in cloud services: Deduplication in cloud storage, IEEE Security & Privacy, vol.8, issue.6, pp.40-47, 2010.

G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar, Know thy neighbor: Crypto library detection in cloud, PoPETs, vol.2015, issue.1, pp.25-40, 2015.

J. Lindemann, Towards abuse detection and prevention in IaaS cloud computing, pp.211-217, 2015.

J. Lindemann and M. Fischer, A memory-deduplication side-channel attack to detect applications in co-resident virtual machines, 2018.

G. Milos, D. G. Murray, S. Hand, and M. A. Fetterman, Satori: Enlightened page sharing, USENIX Annual Technical Conference, 2009.

R. Owens and W. Wang, Non-interactive OS fingerprinting through memory deduplication technique in virtual machines, IEEE International Performance Computing and Communications Conference (IPCCC), pp.1-8, 2011.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, ACM CCS, pp.199-212, 2009.

K. Suzaki, K. Iijima, T. Yagi, and C. Artho, Memory deduplication as a threat to the guest OS, European Workshop on System Security (EUROSEC, 2011.

C. A. Waldspurger, Memory resource management in VMware ESX server, Symposium on Operating System Design and Implementation (OSDI, 2002.

J. Xiao, Z. Xu, H. Huang, and H. Wang, Security implications of memory deduplication in a virtualized environment, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-12, 2013.