-
1
-
-
85080587924
-
-
Aug
-
Cryptography/frequency analysis. http://en.wikibooks.org/wiki/Cryptography:Frequency\ analysis, Aug 2006.
-
(2006)
Cryptography/Frequency Analysis
-
-
-
3
-
-
34547321338
-
Dictionary attacks using keyboard acoustics emanations
-
BERGER, Y., WOOL, A., AND YEREDOR, A. Dictionary attacks using keyboard acoustics emanations. In CCS (2006), ACM, pp. 245–254.
-
(2006)
CCS
, pp. 245-254
-
-
Berger, Y.1
Wool, A.2
Yeredor, A.3
-
4
-
-
84964528874
-
A survey of longest common subsequence algorithms
-
BERGROTH, L., HAKONEN, H., AND RAITA, T. A survey of longest common subsequence algorithms. In Proceedings of Seventh International Symposium on String Processing and Information Retrieval (2000), pp. 39–48.
-
(2000)
Proceedings of Seventh International Symposium on String Processing and Information Retrieval
, pp. 39-48
-
-
Bergroth, L.1
Hakonen, H.2
Raita, T.3
-
6
-
-
17744377974
-
Securing statically-verified communications protocols against timing attacks
-
BUCHHOLTZ, M., GILMORE, S. T., HILLSTON, J., AND NIELSON, F. Securing statically-verified communications protocols against timing attacks. Electronic Notes in Theoretical Computer Science 128, 4 (2005), 123–143.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.128
, Issue.4
, pp. 123-143
-
-
Buchholtz, M.1
Gilmore, S.T.2
Hillston, J.3
Nielson, F.4
-
8
-
-
0038110492
-
A practical implementation of the timing attack
-
DHEM, J. F., KOEUNE, F., LEROUX, P.-A., MESTRE, P., QUISQUATER, J.-J., AND WILLEMS, J.-L. A practical implementation of the timing attack. In Proceedings of CARDIS (1998), pp. 167–182.
-
(1998)
Proceedings of CARDIS
, pp. 167-182
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.-A.3
Mestre, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
10
-
-
85080567211
-
-
as of September
-
EDIT VIRTUAL LANGUAGE CENTER. Word frequency lists. http://www.edict.com.hk/textanalyser/wordlists.htm, as of September, 2008.
-
(2008)
Word Frequency Lists
-
-
-
12
-
-
85028301902
-
Automatic word recognition based on second-order hidden markov models
-
FRANCOIS, M. J., AND PAUL, H. J. Automatic word recognition based on second-order hidden markov models. In ICSLP (1994), pp. 247–250.
-
(1994)
ICSLP
, pp. 247-250
-
-
Francois, M.J.1
Paul, H.J.2
-
13
-
-
79959931744
-
Analysis of the feasibility of keystroke timing attacks over ssh connections
-
School of Engineering and Applied Science, University of Virginia, December
-
HOGYE, M. A., HUGHES, C. T., SARFATY, J. M., AND WOLF, J. D. Analysis of the feasibility of keystroke timing attacks over ssh connections. Technical Report CS588, School of Engineering and Applied Science, University of Virginia, December 2001.
-
(2001)
Technical Report CS588
-
-
Hogye, M.A.1
Hughes, C.T.2
Sarfaty, J.M.3
Wolf, J.D.4
-
14
-
-
85080500008
-
-
INC., R. Process directories. http://www.redhat.com/docs/manuals/enterprise/RHEL-4-Manual/ en-US/ReferenceGuide/s2-proc-processdirs. html, 2007.
-
(2007)
R. Process Directories
-
-
-
16
-
-
0025384135
-
Identity authorization based on keystroke latencies
-
JOYCE, R., AND GUPTA, G. Identity authorization based on keystroke latencies. Communications of the ACM 33, 2 (1990), 168–176.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
17
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
KOCHER, P., JAE, J., AND JUN, B. Differential power analysis. In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (1999), Springer-Verlag, pp. 388–397.
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jae, J.2
Jun, B.3
-
20
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
LUK, C. K., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V. J., AND HAZELWOOD, K. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI’05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation (2005), pp. 190–200.
-
(2005)
PLDI’05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
24
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
RABINER, L. R. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77, 2 (1989), 257–286.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
26
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
USENIX Association
-
SONG, D. X., WAGNER, D., AND TIAN, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security Symposium (2001), USENIX Association.
-
(2001)
USENIX Security Symposium
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
27
-
-
85080593074
-
-
August
-
SOURCEFORGE.NET. http://sourceforge.net/projects/strace/, August 2008.
-
(2008)
NET
-
-
-
28
-
-
85080490315
-
-
TEAM, G. as of September
-
TEAM, G. http://www.gtk.org, as of September, 2008.
-
(2008)
-
-
-
30
-
-
85080628808
-
-
TEAM,. as of September
-
TEAM, P. http://pax.grsecurity.net/, as of September, 2008.
-
(2008)
-
-
-
32
-
-
85077691389
-
Secretly monopolizing the cpu without superuser privileges
-
Berkeley, CA, USA, USENIX Association
-
TSAFRIR, D., ETSION, Y., AND FEITELSON, D. G. Secretly monopolizing the cpu without superuser privileges. In Proceedings of 16th USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 1–18.
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-18
-
-
Tsafrir, D.1
Etsion, Y.2
Feitelson, D.G.3
-
33
-
-
33745778686
-
Keyboard acoustic emanations revisited
-
ACM Press
-
ZHANG, L., ZHOU, F., AND TYGAR, J. D. Keyboard acoustic emanations revisited. In CCS’05: ACM Conference on Computer and Communications Security (2005), ACM Press, pp. 373–382.
-
(2005)
CCS’05: ACM Conference on Computer and Communications Security
, pp. 373-382
-
-
Zhang, L.1
Zhou, F.2
Tygar, J.D.3
|