Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities
暂无分享,去创建一个
Vincent Beroulle | Pierre-Henri Thevenon | Maxime Puys | Nikolaos Foivos Polychronou | V. Beroulle | Pierre-Henri Thevenon | Maxime Puys
[1] Aurélien Francillon,et al. C5: Cross-Cores Cache Covert Channel , 2015, DIMVA.
[2] Shuanghe Peng,et al. Detection of Cache-based Side Channel Attack Based on Performance Counters , 2018 .
[3] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[4] Mathias Payer,et al. HexPADS: A Platform to Detect "Stealth" Attacks , 2016, ESSoS.
[5] Stefan Mangard,et al. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript , 2015, DIMVA.
[6] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[7] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[8] Stefan Mangard,et al. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches , 2015, USENIX Security Symposium.
[9] Kai Li,et al. The PARSEC benchmark suite: Characterization and architectural implications , 2008, 2008 International Conference on Parallel Architectures and Compilation Techniques (PACT).