RAM is expensive—here’s how to use it wisely.
If you can't make it, just fake it.
Abstract: With the popularity of confidential computing, confidential virtual machines (CVMs) have been widely adopted and they guarantee strong security by hardware. However, there still exist some ...