On the Incomparability of Cache Algorithms in Terms of Timing Leakage
暂无分享,去创建一个
[1] Ruby B. Lee,et al. How secure is your cache against side-channel attacks? , 2017, 2017 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[2] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[3] Jan Reineke,et al. Security Analysis of Cache Replacement Policies , 2017, POST.
[4] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[5] Jan Reineke,et al. CacheAudit: A Tool for the Static Analysis of Cache Side Channels , 2013, TSEC.
[6] Laszlo A. Belady,et al. A Study of Replacement Algorithms for Virtual-Storage Computer , 1966, IBM Syst. J..
[7] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[8] Frederic T. Chong,et al. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[9] David Clark,et al. A static analysis for quantifying information flow in a simple imperative language , 2007, J. Comput. Secur..
[10] Eidesstattliche Erklärung,et al. Security of Cache Replacement Policies under Side-Channel Attacks , 2018 .
[11] Robert E. Tarjan,et al. Amortized efficiency of list update and paging rules , 1985, CACM.
[12] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[13] David A. Basin,et al. An information-theoretic model for adaptive side-channel attacks , 2007, CCS '07.
[14] Mário S. Alvim,et al. Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[15] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[16] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[17] Stephen McCamant,et al. Measuring channel capacity to distinguish undue influence , 2009, PLAS '09.
[18] Aleksandar Milenkovic,et al. Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite , 2004, ACM-SE 42.
[19] Reza Dorrigiv,et al. Alternative Measures for the Analysis of Online Algorithms , 2010 .
[20] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[21] Pasquale Malacaria,et al. Quantifying information leaks in software , 2010, ACSAC '10.
[22] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[23] Jan Reineke,et al. Relative competitive analysis of cache replacement policies , 2008, LCTES '08.
[24] Ruby B. Lee,et al. New models of cache architectures characterizing information leakage from cache side channels , 2014, ACSAC.
[25] Yao Wang,et al. A Hardware Design Language for Timing-Sensitive Information-Flow Security , 2015, ASPLOS.
[26] Amos Fiat,et al. Competitive Paging Algorithms , 1991, J. Algorithms.
[27] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES , 2006, IACR Cryptol. ePrint Arch..