An approach with two-stage mode to detect cache-based side channel attacks
暂无分享,去创建一个
[1] Sheng Mou,et al. Feature extraction and classification algorithm for detecting complex covert timing channel , 2012, Comput. Secur..
[2] Wang Yong-Ji,et al. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time , 2011 .
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] Steven Gianvecchio,et al. An Entropy-Based Approach to Detecting Covert Timing Channels , 2011, IEEE Transactions on Dependable and Secure Computing.
[5] Felix C. Freiling,et al. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications , 2011, SEC.
[6] Adi Shamir,et al. Efficient Cache Attacks on AES, and Countermeasures , 2010, Journal of Cryptology.
[7] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[8] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[9] Xiapu Luo,et al. TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[10] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[11] Carla E. Brodley,et al. IP Covert Channel Detection , 2009, TSEC.