HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
暂无分享,去创建一个
Michael K. Reiter | Ari Juels | Yinqian Zhang | Alina Oprea | A. Juels | M. Reiter | Yinqian Zhang | Alina Oprea | Yinqian Zhang | Ari Juels | Alina Oprea | Michael K. Reiter | Ari Juels | Alina Oprea
[1] Jean-Pierre Seifert,et al. Deconstructing new cache designs for thwarting software cache-based side channel attacks , 2008, CSAW '08.
[2] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[3] Paul England,et al. Resource management for isolation enhanced cloud services , 2009, CCSW '09.
[4] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[5] Kazuhiko Minematsu,et al. Improving cache attacks by considering cipher structure , 2005, International Journal of Information Security.
[6] Philip Hawkes,et al. Cache Timing Analysis of LFSR-Based Stream Ciphers , 2009, IMACC.
[7] Johann Großschädl,et al. Cryptographic Side-Channels from Low-Power Cache Memory , 2007, IMACC.
[8] Jun S. Liu,et al. STATISTICAL APPLICATIONS OF THE POISSON-BINOMIAL AND CONDITIONAL BERNOULLI DISTRIBUTIONS , 1997 .
[9] Gil Neiger,et al. IntelŴVirtualization Technology: Hardware Support for Efficient Processor Virtualization , 2006 .
[10] David Chisnall,et al. The Definitive Guide to the Xen Hypervisor , 2007 .
[11] Ramakrishna Gummadi,et al. Determinating timing channels in compute clouds , 2010, CCSW '10.
[12] Todd C. Mowry,et al. Compiler-directed page coloring for multiprocessors , 1996, ASPLOS VII.
[13] Erik Zenner,et al. A Cache Timing Analysis of HC-256 , 2009, Selected Areas in Cryptography.
[14] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[15] Berk Sunar,et al. Tate Pairing with Strong Fault Resiliency , 2007 .
[16] Y. Tsunoo,et al. Cryptanalysis of Block Ciphers Implemented on Computers with Cache , 2002 .
[17] Onur Aciiçmez,et al. New Results on Instruction Cache Attacks , 2010, CHES.
[18] Robert Könighofer,et al. A Fast and Cache-Timing Resistant Implementation of the AES , 2008, CT-RSA.
[19] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[20] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[21] Onur Aciiçmez,et al. An Analytical Model for Time-Driven Cache Attacks , 2007, FSE.
[22] Kai Li,et al. The PARSEC benchmark suite: Characterization and architectural implications , 2008, 2008 International Conference on Parallel Architectures and Compilation Techniques (PACT).
[23] Ruby B. Lee,et al. Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[24] Stefanos Kaxiras,et al. Non deterministic caches: a simple and effective defense against side channel attacks , 2008, Des. Autom. Embed. Syst..
[25] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[26] Ruby B. Lee,et al. A novel cache architecture with enhanced performance and security , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[27] Andrey Bogdanov,et al. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs , 2010, CT-RSA.
[28] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[29] Jean-Pierre Seifert,et al. A refined look at Bernstein's AES side-channel analysis , 2006, ASIACCS '06.
[30] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[31] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[32] Yaozu Dong. Extending Xen* with IntelŴVirtualization Technology , 2006 .
[33] Peter Schwabe,et al. Faster and Timing-Attack Resistant AES-GCM , 2009, CHES.
[34] Yaozu Dong,et al. Extending Xen* with Intel Virtualization Technology , 2006 .
[35] David Chisnall,et al. The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series) , 2007 .
[36] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[37] Hiroshi Miyauchi,et al. Cryptanalysis of DES Implemented on Computers with Cache , 2003, CHES.
[38] Matt Henricksen,et al. Side-Channel Analysis of the K2 Stream Cipher , 2010, ACISP.
[39] Michael J. Flynn,et al. The effect of page allocation on caches , 1992, MICRO.
[40] Christian Bienia,et al. PARSEC 2.0: A New Benchmark Suite for Chip-Multiprocessors , 2009 .
[41] Jean-Pierre Seifert,et al. Cheap Hardware Parallelism Implies Cheap Security , 2007, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007).
[42] Risto M. Hakala,et al. Cache-Timing Template Attacks , 2009, ASIACRYPT.
[43] Chester Rebeiro,et al. Cache Timing Attacks on Clefia , 2009, INDOCRYPT.
[44] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES (Short Paper) , 2006, ICICS.