End-to-end automated cache-timing attack driven by machine learning
暂无分享,去创建一个
Sylvain Guilley | Adrien Facon | Thomas Perianin | Sébastien Carré | Victor Dyseryn | S. Guilley | A. Facon | Victor Dyseryn | Thomas Perianin | Sébastien Carré
[1] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[2] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[3] Igor E. Shparlinski,et al. The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces , 2003, Des. Codes Cryptogr..
[4] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[5] Klaus Wagner,et al. Flush+Flush: A Stealthier Last-Level Cache Attack , 2015, ArXiv.
[6] Jürgen Schmidhuber,et al. Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks , 2006, ICML.
[7] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[8] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[9] L. Rabiner,et al. An introduction to hidden Markov models , 1986, IEEE ASSP Magazine.
[10] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[11] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[12] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[13] Lawrence D. Jackel,et al. Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.
[14] David Naccache,et al. Temperature Attacks , 2009, IEEE Security & Privacy.
[15] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[16] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[17] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[18] Hiroshi Miyauchi,et al. Cryptanalysis of DES Implemented on Computers with Cache , 2003, CHES.
[19] Naomi Benger,et al. "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way , 2014, CHES.
[20] Olivier Meynard,et al. Vade mecum on side-channels attacks and countermeasures for the designer and the evaluator , 2011, 2011 6th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[21] Jeffrey L. Elman,et al. Finding Structure in Time , 1990, Cogn. Sci..
[22] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[23] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[24] Risto M. Hakala,et al. Cache-Timing Template Attacks , 2009, ASIACRYPT.
[25] Naomi Benger,et al. Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack , 2014, IACR Cryptol. ePrint Arch..
[26] Wenbo Wang,et al. Attacking OpenSSL Implementation of ECDSA with a Few Signatures , 2016, CCS.
[27] Yuval Yarom,et al. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack , 2014, USENIX Security Symposium.
[28] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[29] Yuval Yarom,et al. Just a Little Bit More , 2015, CT-RSA.
[30] Tanja Lange,et al. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak , 2017, CHES.
[31] Igor E. Shparlinski,et al. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces , 2002, Journal of Cryptology.
[32] Cesar Pereida García,et al. Constant-Time Callees with Variable-Time Callers , 2017, USENIX Security Symposium.
[33] Alex Pentland,et al. Learning words from sights and sounds: a computational model , 2002, Cogn. Sci..