-
1
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
may
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 191 -206, may 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
2
-
-
78649252382
-
A predictive model for cache-based side channels in multicore and multithreaded microprocessors
-
Berlin, Heidelberg. Springer-Verlag
-
L. Domnitser, N. Abu-Ghazaleh, and D. Ponomarev. A predictive model for cache-based side channels in multicore and multithreaded microprocessors. In Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security, MMMACNS' 10, pages 70-85, Berlin, Heidelberg, 2010. Springer- Verlag.
-
(2010)
Proceedings of the 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMMACNS' 10
, pp. 70-85
-
-
Domnitser, L.1
Abu-Ghazaleh, N.2
Ponomarev, D.3
-
3
-
-
0029308368
-
Effective hardware-based data prefetching for high-performance processors
-
T. fu Chen and J. loup Baer. Effective hardware-based data prefetching for high-performance processors. IEEE Transactions on Computers, 44:609-623, 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, pp. 609-623
-
-
Chen, T.F.1
Baer, J.L.2
-
4
-
-
80051974249
-
Cache games - Bringing access-based cache attacks on aes to practice
-
May
-
D. Gullasch, E. Bangerter, and S. Krenn. Cache games - bringing access-based cache attacks on aes to practice. In Security and Privacy (SP), 2011 IEEE Symposium on, pages 490-505, May 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
, pp. 490-505
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
6
-
-
62349115065
-
-
Springer Publishing Company, Incorporated, 1st edition
-
C. K. Koc. Cryptographic Engineering. Springer Publishing Company, Incorporated, 1st edition, 2008.
-
(2008)
Cryptographic Engineering
-
-
Koc, C.K.1
-
8
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cachebased side channel attacks
-
New York, NY, USA. ACM
-
J. Kong, O. Aciicmez, J.-P. Seifert, and H. Zhou. Deconstructing new cache designs for thwarting software cachebased side channel attacks. In Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pages 25-34, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2nd ACM Workshop on Computer Security Architectures, CSAW '08
, pp. 25-34
-
-
Kong, J.1
Aciicmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
9
-
-
84904650499
-
Investigations of power analysis attacks on smartcards
-
Berkeley, CA, USA. USENIX Association
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Investigations of power analysis attacks on smartcards. In Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, WOST'99, pages 17-17, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, WOST'99
, pp. 17-17
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
10
-
-
17644375823
-
Data cache prefetching using a global history buffer
-
K. J. Nesbit and J. E. Smith. Data cache prefetching using a global history buffer. Ieee Micro, 25(1):90-97, 2004.
-
(2004)
IEEE Micro
, vol.25
, Issue.1
, pp. 90-97
-
-
Nesbit, K.J.1
Smith, J.E.2
-
11
-
-
33745640963
-
Cache attacks and countermeasures: The case of aes
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: The case of aes. In CT-RSA, pages 1-20, 2006.
-
(2006)
CT-RSA
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
12
-
-
1942441379
-
Defending against cache-based side-channel attacks
-
D. Page. Defending against cache-based side-channel attacks. Information Security Technical Report, 8(1):30-44, 2003.
-
(2003)
Information Security Technical Report
, vol.8
, Issue.1
, pp. 30-44
-
-
Page, D.1
-
14
-
-
1342324998
-
Discovering and exploiting program phases
-
nov.-dec.
-
T. Sherwood, E. Perelman, G. Hamerly, S. Sair, and B. Calder. Discovering and exploiting program phases. Micro, IEEE, 23(6):84-93, nov.-dec. 2003.
-
(2003)
Micro, IEEE
, vol.23
, Issue.6
, pp. 84-93
-
-
Sherwood, T.1
Perelman, E.2
Hamerly, G.3
Sair, S.4
Calder, B.5
-
16
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
June
-
Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. SIGAR CH Comput. Archit. News, 35:494-505, June 2007.
-
(2007)
SIGAR CH Comput. Archit. News
, vol.35
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
|