Increasing memory density by using KSM, Linux Symposium, pp.19-28, 2009. ,
Dedup est machina: Memory deduplication as an advanced exploitation vector, IEEE Symposium on Security and Privacy, pp.987-1004, 2016. ,
Safe hardware access with the xen virtual machine monitor, 2004. ,
Practical memory deduplication attacks in sandboxed javascript, ESORICS, Part I, pp.108-122, 2015. ,
Difference engine: harnessing memory redundancy in virtual machines, Commun. ACM, vol.53, issue.10, pp.85-93, 2010. ,
Side channels in cloud services: Deduplication in cloud storage, IEEE Security & Privacy, vol.8, issue.6, pp.40-47, 2010. ,
Know thy neighbor: Crypto library detection in cloud, PoPETs, vol.2015, issue.1, pp.25-40, 2015. ,
Towards abuse detection and prevention in IaaS cloud computing, pp.211-217, 2015. ,
A memory-deduplication side-channel attack to detect applications in co-resident virtual machines, 2018. ,
Satori: Enlightened page sharing, USENIX Annual Technical Conference, 2009. ,
Non-interactive OS fingerprinting through memory deduplication technique in virtual machines, IEEE International Performance Computing and Communications Conference (IPCCC), pp.1-8, 2011. ,
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, ACM CCS, pp.199-212, 2009. ,
Memory deduplication as a threat to the guest OS, European Workshop on System Security (EUROSEC, 2011. ,
Memory resource management in VMware ESX server, Symposium on Operating System Design and Implementation (OSDI, 2002. ,
Security implications of memory deduplication in a virtualized environment, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-12, 2013. ,