Securing virtual machines with AMD Zen CPU architecture and instruction set
It is demonstrated the development of a virtualization environment security subsystem with the help of hardware-accelerated AMD Zen CPU cryptography API and its instruction set for security tasks, including but not limited to: protection against unauthorized memory access, data leaks, hypervisor bre...
Saved in:
| Date: | 2018 |
|---|---|
| Main Authors: | Sokolovskyi, V. S., Karpinets, V. V., Yaremchuk, Yu. E., Prisyagniy, D. P., Pryimak, A. V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2018
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/158525 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: V. S. Sokolovskyi, et al.
Published: (2018)
by: V. S. Sokolovskyi, et al.
Published: (2018)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Захист віртуальних машин на основі інструкцій нового покоління процесорів AMD Zen
by: Соколовський, В.С., et al.
Published: (2018)
by: Соколовський, В.С., et al.
Published: (2018)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Malware dynamic analyses system based on virtual mashine introspection and mashine learning methods
by: Nafiev, A.E., et al.
Published: (2023)
by: Nafiev, A.E., et al.
Published: (2023)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Automated inventory management system on Android using barcodes and QR-codes
by: Haidukevych, Y.O., et al.
Published: (2022)
by: Haidukevych, Y.O., et al.
Published: (2022)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Directions of an Effective Development of Coal Industry With Provision For Energy Safety Requirements
by: Perov M.O., et al.
Published: (2014)
by: Perov M.O., et al.
Published: (2014)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Algorithmic and Structural Circuit Technology Characteristics for Hardware Implementation of Operations with Quaternions in Functional Processors
by: Kalinovsky, Ya.O., et al.
Published: (2013)
by: Kalinovsky, Ya.O., et al.
Published: (2013)
Prediction of the levels of development of coal industry with regard for risks and critical phenomena in the structure of its productive potential in the global coal market
by: Bilan T.R., et al.
Published: (2019)
by: Bilan T.R., et al.
Published: (2019)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
A Cross-Sectional Review of Energy Transition, Security and Climate Change Policies
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Similar Items
-
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: V. S. Sokolovskyi, et al.
Published: (2018) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018) -
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021) -
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)