Key Extraction Attack Using Statistical Analysis of Memory Dump Data
暂无分享,去创建一个
[1] Michael Tüxen,et al. Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension , 2012, RFC.
[2] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[3] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[4] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[5] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[6] Carsten Maartmann-Moe,et al. The persistence of memory: Forensic identification and extraction of cryptographic keys , 2009, Digit. Investig..
[7] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[8] Tilo Müller,et al. FROST - Forensic Recovery of Scrambled Telephones , 2013, ACNS.