메뉴 건너뛰기




Volumn , Issue , 2013, Pages 186-191

An approach with two-stage mode to detect cache-based side channel attacks

Author keywords

attack detection; cache based side channel attacks; cloud computing; virtualization security

Indexed keywords

ATTACK DETECTION; DETECTION APPROACH; PATTERN RECOGNITION TECHNIQUES; RESOURCE UTILIZATIONS; SHARING RESOURCES; SIDE CHANNEL ATTACK; TWO-STAGE DETECTIONS; VIRTUALIZATION SECURITIES;

EID: 84876748582     PISSN: 19767684     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICOIN.2013.6496374     Document Type: Conference Paper
Times cited : (41)

References (11)
  • 1
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, " Lecture Notes in Computer Science, vol.1109, 1996, pp. 104-113.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 6
    • 80052665981 scopus 로고    scopus 로고
    • Detection approach for covert channel based on concurrency conflict interval time
    • Y. J. Wang, J. Z. Wu, L. P. Ding, H. T. Zeng, "Detection Approach for Covert Channel Based on Concurrency Conflict Interval Time" Journal of Computer Research and Development, vol.48, 2011, pp.1542-1553.
    • (2011) Journal of Computer Research and Development , vol.48 , pp. 1542-1553
    • Wang, Y.J.1    Wu, J.Z.2    Ding, L.P.3    Zeng, H.T.4
  • 8
    • 84855987565 scopus 로고    scopus 로고
    • Feature extraction and classification algorithm for detecting complex covert timing channel
    • S. Mou, Z. W. Zhao, S. S. Jiang, Z. S. Wu, J. J. Zhu, "Feature extraction and classification algorithm for detecting complex covert timing channel" Computers & Security, vol.31, 2012, pp.70-82.
    • (2012) Computers & Security , vol.31 , pp. 70-82
    • Mou, S.1    Zhao, Z.W.2    Jiang, S.S.3    Wu, Z.S.4    Zhu, J.J.5
  • 11
    • 74349098073 scopus 로고    scopus 로고
    • Efficient cache attacks on AES, and countermeasure
    • E. Tromer, D. A. Oscik, A. Shamir, "Efficient cache attacks on AES, and countermeasure" Journal of Cryptology, vol.23, 2010, pp.37-71.
    • (2010) Journal of Cryptology , vol.23 , pp. 37-71
    • Tromer, E.1    Oscik, D.A.2    Shamir, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.