-
1
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, " Lecture Notes in Computer Science, vol.1109, 1996, pp. 104-113.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
2
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM Press
-
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds" Proc. the 6th ACM Conference on Computer and Communications Security (CCS 09), ACM Press, 2009, pp.199-212.
-
(2009)
Proc. The 6th ACM Conference on Computer and Communications Security (CCS 09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
3
-
-
80052008862
-
HomeAlone: Coresidency detection in the cloud via side-channel analysis
-
IEEE Press
-
Y. Q. Zhang, A. Juels, A. Oprea, M. K. Reiter, "HomeAlone: Coresidency detection in the cloud via side-channel analysis" Proc. the 2011 IEEE Symposium on Security and Privacy (SP 11), IEEE Press, 2011, pp.313-328.
-
(2011)
Proc. The 2011 IEEE Symposium on Security and Privacy (SP 11)
, pp. 313-328
-
-
Zhang, Y.Q.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
4
-
-
76849086598
-
IP covert channel detection
-
S. Cabuk, C. E. Brodley, C. Shields, "IP covert channel detection" ACM Transaction on Information and System Security, vol.12, 2009, pp.1-29.
-
(2009)
ACM Transaction on Information and System Security
, vol.12
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
6
-
-
80052665981
-
Detection approach for covert channel based on concurrency conflict interval time
-
Y. J. Wang, J. Z. Wu, L. P. Ding, H. T. Zeng, "Detection Approach for Covert Channel Based on Concurrency Conflict Interval Time" Journal of Computer Research and Development, vol.48, 2011, pp.1542-1553.
-
(2011)
Journal of Computer Research and Development
, vol.48
, pp. 1542-1553
-
-
Wang, Y.J.1
Wu, J.Z.2
Ding, L.P.3
Zeng, H.T.4
-
8
-
-
84855987565
-
Feature extraction and classification algorithm for detecting complex covert timing channel
-
S. Mou, Z. W. Zhao, S. S. Jiang, Z. S. Wu, J. J. Zhu, "Feature extraction and classification algorithm for detecting complex covert timing channel" Computers & Security, vol.31, 2012, pp.70-82.
-
(2012)
Computers & Security
, vol.31
, pp. 70-82
-
-
Mou, S.1
Zhao, Z.W.2
Jiang, S.S.3
Wu, Z.S.4
Zhu, J.J.5
-
9
-
-
53349172202
-
TCP covert timing channel: Design and detection
-
IEEE Press
-
X. P. Luo, E. Chan, R. Chang, "TCP covert timing channel: design and detection" Proc. International Conference on Dependable Systems and Networks (DSN 08), IEEE Press, 2008, pp.420-429.
-
(2008)
Proc. International Conference on Dependable Systems and Networks (DSN 08)
, pp. 420-429
-
-
Luo, X.P.1
Chan, E.2
Chang, R.3
-
10
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
ACM Press
-
P. Peng, P. Ning, D. Reeves, "Tracking anonymous peer-to-peer VoIP Calls on the Internet" Proc. ACM Conference on Computer and Communications Security(CCS 05), ACM Press, 2005, pp.81-91.
-
(2005)
Proc. ACM Conference on Computer and Communications Security(CCS 05)
, pp. 81-91
-
-
Peng, P.1
Ning, P.2
Reeves, D.3
-
11
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasure
-
E. Tromer, D. A. Oscik, A. Shamir, "Efficient cache attacks on AES, and countermeasure" Journal of Cryptology, vol.23, 2010, pp.37-71.
-
(2010)
Journal of Cryptology
, vol.23
, pp. 37-71
-
-
Tromer, E.1
Oscik, D.A.2
Shamir, A.3
|