Cryptographically Secure Detection of Injection Attacks
暂无分享,去创建一个
[1] Herbert Bos,et al. Throwhammer: Rowhammer Attacks over the Network and Defenses , 2018, USENIX Annual Technical Conference.
[2] Yanick Fratantonio,et al. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms , 2016, CCS.
[3] Rafail Ostrovsky,et al. Provably Secure Virus Detection: Using The Observer Effect Against Malware , 2016, ICALP.
[4] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[5] Richard J. Lipton,et al. Provably-Secure Remote Memory Attestation for Heap Overflow Protection , 2016, SCN.
[6] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[7] Herbert Bos,et al. Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[8] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[9] Christopher Krügel,et al. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM , 2018, DIMVA.
[10] MutluOnur,et al. Flipping bits in memory without accessing them , 2014 .