1. Strengthening VM isolation with integrity protection and more;White Paper, January,2020
2. Characterizing hypervisor vulnerabilities in cloud computing servers;Perez-Botero
3. Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU;Alex,2021
4. Rendered insecure: GPU side channel attacks are practical;Naghibijouybari,2018