Processor idle states, Covert channel attacks, Side channel attacks, Data center security.
Cloud Computing & Applications Optimizations
Security Vulnerabilities in Computer Systems