Cross-VM side channels and their use to extract private keys
暂无分享,去创建一个
Michael K. Reiter | Thomas Ristenpart | Ari Juels | Yinqian Zhang | A. Juels | M. Reiter | T. Ristenpart | Yinqian Zhang
[1] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[2] N. Gautham. Bioinformatics: Databases and Algorithms , 2006 .
[3] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[4] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[5] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[6] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[7] David Chisnall. The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series) , 2007 .
[8] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[9] Weichao Wang,et al. Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines , 2011, 30th IEEE International Performance Computing and Communications Conference.
[10] Paul England,et al. Virtual machines for enterprise desktop security , 2006, Inf. Secur. Tech. Rep..
[11] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[12] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[13] Onur Aciiçmez,et al. New Results on Instruction Cache Attacks , 2010, CHES.
[14] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[15] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[16] Christus,et al. A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .
[17] Peter Desnoyers,et al. Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.
[18] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[19] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[20] Onur Aciiçmez,et al. Yet another MicroArchitectural Attack:: exploiting I-Cache , 2007, CSAW '07.
[21] Dan Page,et al. Partitioned Cache Architecture as a Side-Channel Defence Mechanism , 2005, IACR Cryptology ePrint Archive.
[22] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[23] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[24] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[25] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[26] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[27] J. Rutkowska. Qubes OS Architecture , 2010 .
[28] Anthony D. Joseph,et al. Virtics : A System for Privilege Separation of Legacy Desktop Applications , 2010 .
[29] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[30] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[31] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[32] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[33] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[34] Jean-Pierre Seifert,et al. Cheap Hardware Parallelism Implies Cheap Security , 2007, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007).
[35] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[36] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[37] Andrew J. Viterbi,et al. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.
[38] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[39] Dan Tsafrir,et al. Secretly Monopolizing the CPU Without Superuser Privileges , 2007, USENIX Security Symposium.
[40] Benedikt Heinz,et al. A Cache Timing Attack on AES in Virtualization Environments , 2012, Financial Cryptography.