-
3
-
-
84975609041
-
Acoustic side-channel attacks on printers
-
BACKES, M., DURMUTH, M., GERLING, S., PINKAL, M., AND SPORLEDER, C. 2010. Acoustic side-channel attacks on printers. In Proceedings of the USENIX Security Symposium.
-
(2010)
Proceedings of the USENIX Security Symposium
-
-
Backes, M.1
Durmuth, M.2
Gerling, S.3
Pinkal, M.4
Sporleder, C.5
-
6
-
-
0026397734
-
Packaging of multi-core microprocessors: Tradeoffs and potential solutions
-
BIHAM, E. AND SHAMIR, A. 1991. Packaging of multi-core microprocessors: Tradeoffs and potential solutions. J. Cryptology 4, 1, 3-72.
-
(1991)
J. Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
38549138136
-
Software mitigation to hedge aes against cachebased software side channel vulnerabilities
-
BRICKELL, E., GRAUNKE, G., NEVE, M., AND SEIFERT, J. 2006. Software mitigation to hedge aes against cachebased software side channel vulnerabilities. IACR ePrint Archive, rep. 2006/052.
-
(2006)
IACR EPrint Archive, Rep. 2006/052
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.4
-
14
-
-
77954998134
-
High performance cache replacement using re-reference interval prediction (rrip)
-
JALEEL, A., THEOBALD, K., STEELY, S., AND EMER, J. 2010. High performance cache replacement using re-reference interval prediction (rrip). In Proceedings of the International Symposium on Computer Architecture (ISCA).
-
(2010)
Proceedings of the International Symposium on Computer Architecture (ISCA)
-
-
Jaleel, A.1
Theobald, K.2
Steely, S.3
Emer, J.4
-
15
-
-
84958769993
-
Side channel cryptanalysis of product ciphers
-
Computer Security - ESORICS 98
-
KELSEY, J., SHNEIER, B., WAGNER, D., AND HALL, C. 1998. Side channel cryptanalysis of product ciphers. In Proceedings of the 5th European Symposium on Research in Computer Security. 97-110. (Pubitemid 128135767)
-
(1998)
Lecture Notes in Computer Science
, Issue.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
16
-
-
51749105240
-
Non-deterministic caches: A simple and effective defense against side channel attacks
-
KERAMIDAS, G., ANTONOPOULOS, A., SERPANOS, D., AND KAXIRAS, S. 2008. Non-deterministic caches: A simple and effective defense against side channel attacks. Design Automation Embedd. Syst.
-
(2008)
Design Automation Embedd. Syst.
-
-
Keramidas, G.1
Antonopoulos, A.2
Serpanos, D.3
Kaxiras, S.4
-
17
-
-
64949105813
-
Hardware-software integrated approaches to defend against software cache-based side channel attacks
-
KONG, J., ACLICMEZ, O., SEIFERT, J., AND ZHOU, H. 2009. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In Proceedings of the International Symposium on High Performance Computer Architecture (HPCA).
-
(2009)
Proceedings of the International Symposium on High Performance Computer Architecture (HPCA)
-
-
Kong, J.1
Aclicmez, O.2
Seifert, J.3
Zhou, H.4
-
20
-
-
31944440969
-
PIN: Building customized program analysis tools with dynamic instrumentation
-
LUK, C., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V., AND HAZELWOOD, K. 2005. PIN: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
-
(2005)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
24
-
-
84857838747
-
-
MIBENCH
-
MIBENCH. 2009. The MiBench benchmark suite. http://www.eecs.umich.edu/ mibench/.
-
(2009)
The MiBench Benchmark Suite
-
-
-
27
-
-
38349031545
-
Cache attacks and countermeasures: The case of aes
-
OSVIK, D., SHAMIR, A., AND TROMER, E. 2005. Cache attacks and countermeasures: the case of aes. Cryptology ePrint Archive, rep. 2005/271.
-
(2005)
Cryptology EPrint Archive, Rep. 2005/271
-
-
Osvik, D.1
Shamir, A.2
Tromer, E.3
-
28
-
-
38549120069
-
Partitioned cache architecture as a side-channel defense mechanism
-
PAGE, D. 2005. Partitioned cache architecture as a side-channel defense mechanism. Cryptology ePrint Archive.
-
(2005)
Cryptology EPrint Archive
-
-
Page, D.1
-
30
-
-
84857838753
-
-
PINPOINTS
-
PINPOINTS. 2009. Pinpoints home page. http://www.cs.virginia.edu/wiki/ pin/index.php/PinPoints.
-
(2009)
Pinpoints Home Page
-
-
-
31
-
-
34548042910
-
Utility-based cache partitioning: A low-overhead, high-performance, runtime mechanism to partition shared caches
-
DOI 10.1109/MICRO.2006.49, 4041865, Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-39
-
QURESHI, M. AND PATT, Y. 2006. Utility-based partitioning: A low-overhead, high-performance, runtime mechanism to partition shared caches. In Proceedings of the International Symposium on Microarchitecture (MICRO-39). 423-432. (Pubitemid 351337015)
-
(2006)
Proceedings of the Annual International Symposium on Microarchitecture, MICRO
, pp. 423-432
-
-
Qureshi, M.K.1
Patt, Y.N.2
-
32
-
-
84857858145
-
-
RANDOM
-
RANDOM. 2009. Random.org. http://www.random.org/.
-
(2009)
-
-
-
34
-
-
78149242271
-
Spec cpu2006 benchmark tools
-
SPRADLING, C. D. 2007. Spec cpu2006 benchmark tools. SIGARCH Comput. Archit. News 35, 1, 130-134.
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, Issue.1
, pp. 130-134
-
-
Spradling, C.D.1
-
35
-
-
84857836808
-
Towards security limits in sidechannel attacks
-
STANDAERT, F.-X., PEETERS, E., ARCHAMBEAU, C., AND QUISQUATER, J.-J. 2006. Towards security limits in sidechannel attacks. In Proceedings of the CHES Workshop.
-
(2006)
Proceedings of the CHES Workshop
-
-
Standaert, F.-X.1
Peeters, E.2
Archambeau, C.3
Quisquater, J.-J.4
-
37
-
-
78649287344
-
Efficient cache attacks on aes, and countermeasures
-
TROMER, E., SHAMIR, A., AND OSVIK, D. 2009. Efficient cache attacks on aes, and countermeasures. J. Cryptology.
-
(2009)
J. Cryptology
-
-
Tromer, E.1
Shamir, A.2
Osvik, D.3
-
38
-
-
35248855964
-
Crypronalysis of des implemented on computers with cache
-
TSUNOO, Y., SAITO, T., SUZAKI, T., SHIGERI, M., AND MIYAUCHI, H. 2003. Crypronalysis of des implemented on computers with cache. In Proceedings of the Cryptographic Hardware and Embedded Systems (CHES) Workshop. 62-76.
-
(2003)
Proceedings of the Cryptographic Hardware and Embedded Systems (CHES) Workshop
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
39
-
-
33750825939
-
Crypronalysis of block ciphers implemented on computers with cache
-
TSUNOO, Y., TSUJIHARA, E., MINEMATSU, K., AND MIYAUCHI, H. 2002. Crypronalysis of block ciphers implemented on computers with cache. In Proceedings of the ICITA Conference.
-
(2002)
Proceedings of the ICITA Conference
-
-
Tsunoo, Y.1
Tsujihara, E.2
Minematsu, K.3
Miyauchi, H.4
-
43
-
-
79951802939
-
Improved cache trace attack on AES and CLEFIA by considering cache miss and s-box misalignment
-
ZHAO, X. AND WANG, T. 2010. Improved cache trace attack on AES and CLEFIA by considering cache miss and s-box misalignment. Cryptology ePrint Archive, rep. 2010/056.
-
(2010)
Cryptology EPrint Archive, Rep. 2010/056
-
-
Zhao, X.1
Wang, T.2
-
44
-
-
78149242606
-
An efficient simulation algorithm for cache of random replacement policy
-
ZHOU, S. 2010. An efficient simulation algorithm for cache of random replacement policy. Lecture Notes in Computer Science vol. 6289, 144-154.
-
(2010)
Lecture Notes in Computer Science
, vol.6289
, pp. 144-154
-
-
Zhou, S.1
|