Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks
暂无分享,去创建一个
Chester Rebeiro | Debdeep Mukhopadhyay | Sarani Bhattacharya | C. Rebeiro | Debdeep Mukhopadhyay | Sarani Bhattacharya
[1] Masanobu Katagi,et al. The 128-Bit Blockcipher CLEFIA , 2007, RFC.
[2] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[3] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[4] Chester Rebeiro,et al. Cache Timing Attacks on Clefia , 2009, INDOCRYPT.
[5] Chester Rebeiro,et al. Boosting Profiled Cache Timing Attacks With A Priori Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[6] Anne Canteaut,et al. Understanding cache attacks , 2006 .
[7] Benedikt Heinz,et al. A Cache Timing Attack on AES in Virtualization Environments , 2012, Financial Cryptography.
[8] Simha Sethumadhavan,et al. Side-channel vulnerability factor: A metric for measuring information leakage , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[9] Hiroshi Miyauchi,et al. Cryptanalysis of DES Implemented on Computers with Cache , 2003, CHES.
[10] Dan S. Wallach,et al. Opportunities and Limits of Remote Timing Attacks , 2009, TSEC.
[11] Y. Tsunoo,et al. Cryptanalysis of Block Ciphers Implemented on Computers with Cache , 2002 .
[12] Nael B. Abu-Ghazaleh,et al. Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks , 2012, TACO.
[13] Andreas Dewald,et al. TRESOR Runs Encryption Securely Outside RAM , 2011, USENIX Security Symposium.
[14] Dan Page,et al. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel , 2002, IACR Cryptol. ePrint Arch..
[15] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[16] Chester Rebeiro,et al. Bitslice Implementation of AES , 2006, CANS.
[17] Jean-Pierre Seifert,et al. A refined look at Bernstein's AES side-channel analysis , 2006, ASIACCS '06.
[18] Kyoji Shibutani,et al. The 128-Bit Blockcipher CLEFIA (Extended Abstract) , 2007, FSE.
[19] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[20] David A. Patterson,et al. Computer Architecture, Fifth Edition: A Quantitative Approach , 2011 .
[21] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .