메뉴 건너뛰기




Volumn , Issue , 2007, Pages 75-79

Countermeasures against branch target buffer attacks

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK METHODS; BRANCH TARGET BUFFERS; CODE TRANSFORMATIONS; COUNTER-MEASURES; CRYPTOGRAPHIC ALGORITHMS; EXECUTION TIMES; PERFORMANCE PENALTIES; PUBLIC KEYS; SOFTWARE IMPLEMENTATIONS;

EID: 47949084990     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FDTC.2007.4318987     Document Type: Conference Paper
Times cited : (18)

References (10)
  • 1
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • David Brumley and Dan Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701-716, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 3
    • 47949106247 scopus 로고    scopus 로고
    • Branch target buffer for dynamically predicting branch instruction out-comes using a predicted branch history
    • US Patent 08/509331, Internation Class G06F 9/38, 1996
    • Bradley D. Hoyt, Glenn J. Hinton, Andrew F. Glew, and Subramanian Natarajan. Branch target buffer for dynamically predicting branch instruction out-comes using a predicted branch history. US Patent 08/509331, Internation Class G06F 9/38, 1996.
    • Hoyt, B.D.1    Hinton, G.J.2    Glew, A.F.3    Natarajan, S.4
  • 6
    • 84944627047 scopus 로고    scopus 로고
    • Predicting secret keys via branch prediction. In Topics in Cryptology
    • The Cryptographers' Track at the RSA Conference, CT-RSA, of, Springer, Feb
    • Onur Aciiçmez, Jean-Pierre Seifert, and Çetín Kaya Koç. Predicting secret keys via branch prediction. In Topics in Cryptology, The Cryptographers' Track at the RSA Conference, CT-RSA 2007, volume 4377 of LNCS, pages 225-242. Springer, Feb 2007.
    • (2007) LNCS , vol.4377 , pp. 225-242
    • Aciiçmez, O.1    Seifert, J.-P.2    Kaya Koç, C.3
  • 7
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
    • Neal Koblitz, editor, CRYPTO, of, Springer
    • Paul C. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In Neal Koblitz, editor, CRYPTO, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 9
    • 33745813464 scopus 로고    scopus 로고
    • The program counter security model: Automatic detection and removal of control-flow side channel attacks
    • Dongho Won and Seungjoo Kim, editors, ICISC, of, Springer
    • David Molnar, Matt Piotrowski, David Schultz, and David Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In Dongho Won and Seungjoo Kim, editors, ICISC, volume 3935 of Lecture Notes in Computer Science, pages 156-168. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3935 , pp. 156-168
    • Molnar, D.1    Piotrowski, M.2    Schultz, D.3    Wagner, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.