Lines Matching full:attack
19 additional attack vectors that arise in the confidential computing space
91 | External attack | | Interfaces |
118 Regarding external attack vectors, it is interesting to note that in most
131 CoCo VM TCB due to its large SW attack surface. It is important to note
144 | External attack | | | Interfaces | |
161 leverage this access to attack the guest, the CoCo systems mitigate such
189 The **Linux CoCo VM attack surface** is any interface exposed from a CoCo
232 virtual devices. This allows any attack against confidentiality,
240 side-channel and/or transient execution attack vectors.
245 difference with the previous attack vector (malformed runtime input)
250 be an attack vector on its own, if it results in a particular guest