-
1
-
-
85177666484
-
-
Amazon elastic compute cloud. http://aws.amazon.com/ec2/.
-
-
-
-
3
-
-
85177677746
-
-
Rackspace. http://www.rackspacecloud.com/.
-
-
-
-
4
-
-
78049348331
-
New results on instruction cache attacks
-
August
-
O. Aciiçmez, B. B. Brumley, and P. Grabher. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, pages 110-124, August 2010.
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop
, pp. 110-124
-
-
Aciiçmez, O.1
Brumley, B.B.2
Grabher, P.3
-
6
-
-
84876307879
-
On the power of simple branch prediction analysis
-
March
-
O. Aciiçmez, Ç. K. Koç, and J.-P. Seifert. On the power of simple branch prediction analysis. In 2nd ACM Symposium on Information, Computer and Communications Security, pages 312-320, March 2007.
-
(2007)
2nd ACM Symposium on Information, Computer and Communications Security
, pp. 312-320
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
7
-
-
84944627047
-
Predicting secret keys via branch prediction
-
February
-
O. Aciiçmez, Ç. K. Koç, and J.-P. Seifert. Predicting secret keys via branch prediction. In Topics in Cryptology - CTRSA 2007, The Cryptographers' Track at the RSA Conference 2007, pages 225-242, February 2007.
-
(2007)
Topics in Cryptology - CTRSA 2007, the Cryptographers' Track at the RSA Conference 2007
, pp. 225-242
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
8
-
-
85022027006
-
Cache based remote timing attack on the AES
-
February
-
O. Aciiçmez, W. Schindler, and Ç. K. Koç. Cache based remote timing attack on the AES. In Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, pages 271-286, February 2007.
-
(2007)
Topics in Cryptology - CT-RSA 2007, the Cryptographers' Track at the RSA Conference 2007
, pp. 271-286
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, C.K.3
-
10
-
-
78650158728
-
Determinating timing channels in compute clouds
-
October
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi. Determinating timing channels in compute clouds. In ACM Cloud Computing Security Workshop, pages 103-108, October 2010.
-
(2010)
ACM Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
14
-
-
77952033303
-
Differential cache-collision timing attacks on AES with applications to embedded CPUs
-
March
-
A. Bogdanov, T. Eisenbarth, C. Paar, and M. Wienecke. Differential cache-collision timing attacks on AES with applications to embedded CPUs. In Topics in Cryptology - CTRSA 2010, The Cryptographers' Track at the RSA Conference 2010, pages 235-251, March 2010.
-
(2010)
Topics in Cryptology - CTRSA 2010, the Cryptographers' Track at the RSA Conference 2010
, pp. 235-251
-
-
Bogdanov, A.1
Eisenbarth, T.2
Paar, C.3
Wienecke, M.4
-
17
-
-
17044422621
-
Compiler-directed page coloring for multiprocessors
-
E. Bugnion, J. M. Anderson, T. C. Mowry, M. Rosenblum, and M. S. Lam. Compiler-directed page coloring for multiprocessors. In 7th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 244-255, 1996.
-
(1996)
7th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 244-255
-
-
Bugnion, E.1
Anderson, J.M.2
Mowry, T.C.3
Rosenblum, M.4
Lam, M.S.5
-
19
-
-
0031313967
-
Statistical applications to the poisson-binomial and conditional bernoulli distributions
-
S.X̃. Chen and J.S̃. Liu. Statistical applications to the Poisson-binomial and conditional Bernoulli distributions. Statistica Sinica, 7:875-892, 1997.
-
(1997)
Statistica Sinica
, vol.7
, pp. 875-892
-
-
Chen, S.X.1
Liu, J.S.2
-
22
-
-
35448966784
-
Extending xen with intel virtualization technology
-
Y. Dong, S. Li, A. Mallick, J. Nakajima, K. Tian, X. Xu, F. Yang, and W. Yu. Extending Xen with Intel virtualization technology. Intel Technology Journal, 10, 2006.
-
Intel Technology Journal
, vol.10
, pp. 2006
-
-
Dong, Y.1
Li, S.2
Mallick, A.3
Nakajima, J.4
Tian, K.5
Xu, X.6
Yang, F.7
Yu, W.8
-
23
-
-
38349058412
-
Cryptographic side-channels from low-power cache memory
-
December
-
P. Grabher, J. Großschädl, and D. Page. Cryptographic side-channels from low-power cache memory. In Cryptography and Coding, 11th IMA International Conference, pages 170-184, December 2007.
-
(2007)
Cryptography and Coding, 11th IMA International Conference
, pp. 170-184
-
-
Grabher, P.1
Großschädl, J.2
Page, D.3
-
24
-
-
78649815492
-
Side-channel analysis of the K2 stream cipher
-
July
-
M. Henricksen, W. S. Yap, C. H. Yian, S. Kiyomoto, and T. Tanaka. Side-channel analysis of the K2 stream cipher. In Information Security and Privacy, 15th Australasian Conference, ACISP 2010, pages 53-73, July 2010.
-
(2010)
Information Security and Privacy, 15th Australasian Conference, ACISP 2010
, pp. 53-73
-
-
Henricksen, M.1
Yap, W.S.2
Yian, C.H.3
Kiyomoto, S.4
Tanaka, T.5
-
26
-
-
51749105240
-
Non deterministic caches: A simple and effective defense against side channel attacks
-
G. Keramidas, A. Antonopoulos, D. N. Serpanos, and S. Kaxiras. Non deterministic caches: A simple and effective defense against side channel attacks. Design Automation for Embedded Systems, 12(3):221-230, 2008.
-
(2008)
Design Automation for Embedded Systems
, vol.12
, Issue.3
, pp. 221-230
-
-
Keramidas, G.1
Antonopoulos, A.2
Serpanos, D.N.3
Kaxiras, S.4
-
27
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Advances in Cryptology - CRYPTO '96
-
P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Advances in Cryptology - Proceedings of Crypto'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996. (Pubitemid 126106234)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
28
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
October
-
J. Kong, O. Aciiçmez, J.-P. Seifert, and H. Zhou. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In 2nd ACM Workshop on Computer Security Architectures, pages 25-34, October 2008.
-
(2008)
2nd ACM Workshop on Computer Security Architectures
, pp. 25-34
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
30
-
-
72449180793
-
Cache timing analysis of LFSR-based stream ciphers
-
December
-
G. Leander, E. Zenner, and P. Hawkes. Cache timing analysis of LFSR-based stream ciphers. In Cryptography and Coding, 12th IMA International Conference, pages 433-445, December 2009.
-
(2009)
Cryptography and Coding, 12th IMA International Conference
, pp. 433-445
-
-
Leander, G.1
Zenner, E.2
Hawkes, P.3
-
32
-
-
33846483949
-
Intel virtualization technology: Hardware support for for efficient processor virtualization
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig. Intel virtualization technology: Hardware support for for efficient processor virtualization. Intel Technology Journal, 10, 2006.
-
Intel Technology Journal
, vol.10
, pp. 2006
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
35
-
-
34047117968
-
Cache missing for fun and profit
-
C. Percival. Cache missing for fun and profit. In BSDCon 2005, 2005.
-
(2005)
BSDCon 2005
-
-
Percival, C.1
-
36
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
November
-
H. Raj, R. Nathuji, A. Singh, and P. England. Resource management for isolation enhanced cloud services. In ACM Cloud Computing Security Workshop, pages 77-84, November 2009.
-
(2009)
ACM Cloud Computing Security Workshop
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
37
-
-
77649245278
-
Cache timing attacks on clefia
-
December
-
C. Rebeiro, D. Mukhopadhyay, J. Takahashi, and T. Fukunaga. Cache timing attacks on Clefia. In Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, pages 104-118, December 2009.
-
(2009)
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India
, pp. 104-118
-
-
Rebeiro, C.1
Mukhopadhyay, D.2
Takahashi, J.3
Fukunaga, T.4
-
38
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In 16th ACM Conference on Computer and Communications Security, pages 199-212, 2009.
-
(2009)
16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
39
-
-
80051997870
-
Companies slowly join cloud-computing
-
18 April
-
B. Stone and A. Vance. Companies slowly join cloud-computing. New York Times, 18 April 2010.
-
(2010)
New York Times
-
-
Stone, B.1
Vance, A.2
-
40
-
-
38149099434
-
An analytical model for time-driven cache attacks
-
K. Tiri, O. Aciiçmez, M. Neve, and F. Andersen. An analytical model for time-driven cache attacks. In Fast Software Encryption, 14th International Workshop, FSE 2007, pages 399-413, 2007.
-
(2007)
Fast Software Encryption, 14th International Workshop, FSE 2007
, pp. 399-413
-
-
Tiri, K.1
Aciiçmez, O.2
Neve, M.3
Andersen, F.4
-
41
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
42
-
-
35248855964
-
Cryptanalysis of DES implemented on computers with cache
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES implemented on computers with cache. In Cryptographic Hardware and Embedded Systems - CHES 2003, pages 62-76, 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2003
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
43
-
-
33750825939
-
Cryptanalysis of block ciphers implemented on computers with cache
-
Y. Tsunoo, E. Tsujihara, K. Minematsu, and H. Miyauchi. Cryptanalysis of block ciphers implemented on computers with cache. In International Symposium on Information Theory and Its Applications, pages 803-806, 2002.
-
(2002)
International Symposium on Information Theory and its Applications
, pp. 803-806
-
-
Tsunoo, Y.1
Tsujihara, E.2
Minematsu, K.3
Miyauchi, H.4
-
44
-
-
33745145787
-
Improving cache attacks by considering cipher structure
-
DOI 10.1007/s10207-005-0079-7
-
Y. Tsunoo, E. Tsujihara, M. Shigeri, H. Kubo, and K. Minematsu. Improving cache attacks using cipher structure. International Journal of Information Security, 5(3):166-176, 2006. (Pubitemid 43898958)
-
(2006)
International Journal of Information Security
, vol.5
, Issue.3
, pp. 166-176
-
-
Tsunoo, Y.1
Tsujihara, E.2
Shigeri, M.3
Kubo, H.4
Minematsu, K.5
-
45
-
-
85177666805
-
Will security concerns darken google's government cloud?
-
17 September
-
J. Vijayan. Will security concerns darken Google's government cloud? ComputerWorld, 17 September 2009.
-
(2009)
ComputerWorld
-
-
Vijayan, J.1
-
46
-
-
34547331261
-
Covert and side channels due to processor architecture
-
DOI 10.1109/ACSAC.2006.20, 4041191, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
Z. Wang and R. B. Lee. Covert and side channels due to processor architecture. In 22nd Annual Computer Security Applications Conference (ACSAC), pages 473-482, December 2006. (Pubitemid 351232939)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 473-482
-
-
Wang, Z.1
Lee, R.B.2
-
47
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
DOI 10.1145/1250662.1250723, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings
-
Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In 34th International Symposium on Computer Architecture, pages 494-505, June 2007. (Pubitemid 47582127)
-
(2007)
Proceedings - International Symposium on Computer Architecture
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
|