메뉴 건너뛰기




Volumn , Issue , 2009, Pages 45-60

Practical mitigations for timing-based side-channel attacks on modern x86 processors

Author keywords

[No Author keywords available]

Indexed keywords

CACHE BEHAVIOR; COMPILER TECHNIQUES; CONTROL FLOWS; DATA FLOW; DEFENSE MECHANISM; PROOF OF CONCEPT; SIDE CHANNEL ATTACK; TIMING INFORMATION;

EID: 70449623154     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.19     Document Type: Conference Paper
Times cited : (196)

References (31)
  • 7
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • -, "New cache designs for thwarting software cache-based side channel attacks," SIGARCH Comput. Archit. News, vol.35, no.2, pp. 494-505, 2007.
    • (2007) SIGARCH Comput. Archit. News , vol.35 , Issue.2 , pp. 494-505
  • 9
    • 38549138136 scopus 로고    scopus 로고
    • Software mitigations to hedge AES against cache-based software side channel vulnerabilities
    • report 2006/052
    • E. Brickell, G. Graunke, M. Neve, and J. pierre Seifert, "Software mitigations to hedge AES against cache-based software side channel vulnerabilities. iacr eprint archive, report 2006/052," 2006.
    • (2006) Iacr Eprint Archive
    • Brickell, E.1    Graunke, G.2    Neve, M.3    Seifert, J.P.4
  • 11
    • 84876307879 scopus 로고    scopus 로고
    • On the power of simple branch prediction analysis
    • O. Aciiçmez, Çetin Kaya Koç, and J.-P. Seifert, "On the power of simple branch prediction analysis," in ASIACCS '07, 2007.
    • (2007) ASIACCS '07
    • Aciiçmez, O.1    Koç, C.K.2    Seifert, J.-P.3
  • 14
    • 70449675390 scopus 로고    scopus 로고
    • The program counter security model: Automatic detection and removal of control-flow side channel attacks
    • -, "The program counter security model: Automatic detection and removal of control-flow side channel attacks," in In Cryptology ePrint Archive, Report 2005/368, 2005.
    • (2005) Cryptology ePrint Archive, Report 2005/368
  • 21
    • 64949133467 scopus 로고    scopus 로고
    • Advanced encryption standard (AES) instructions set
    • S. Gueron, "Advanced encryption standard (AES) instructions set," Intel Mobility Group, Tech. Rep., 2008.
    • (2008) Intel Mobility Group, Tech. Rep.
    • Gueron, S.1
  • 25
    • 14344276582 scopus 로고    scopus 로고
    • Performance evaluation of AES finalists on the high-end smart card
    • F. Sano, M. Koike, S. Kawamura, and M. Shiba, "Performance evaluation of AES finalists on the high-end smart card," in AES Candidate Conference, 2000, pp. 82-93.
    • (2000) AES Candidate Conference , pp. 82-93
    • Sano, F.1    Koike, M.2    Kawamura, S.3    Shiba, M.4
  • 28
    • 70449649144 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the advanced encryption standard (AES)
    • J. Blömer and J.-P. Seifert, "Fault based cryptanalysis of the advanced encryption standard (AES)," in FSE, 2003.
    • (2003) FSE
    • Blömer, J.1    Seifert, J.-P.2
  • 30
    • 70449661397 scopus 로고    scopus 로고
    • Using exception handling to build opaque predicates in intermediate code obfuscation techniques
    • D. Dolz and G. Parra, "Using exception handling to build opaque predicates in intermediate code obfuscation techniques," Journal of Computer Science & Technology, vol.8, no.2, 2008.
    • (2008) Journal of Computer Science & Technology , vol.8 , Issue.2
    • Dolz, D.1    Parra, G.2
  • 31
    • 36949003942 scopus 로고    scopus 로고
    • LLVM: A compilation framework for lifelong program analysis & transformation
    • Computer Science Dept. Univ. of Illinois at Urbana-Champaign, Sep
    • C. Lattner and V. Adve, "LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation," Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Tech. Report UIUCDCS-R-2003-2380, Sep 2003.
    • (2003) Tech. Report UIUCDCS-R-2003-2380
    • Lattner, C.1    Adve, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.