-
1
-
-
84976844361
-
Control flow analysis
-
July
-
F. E. Allen. Control flow analysis. SIGPLAN Not., 5(7):1-19, July 1970.
-
(1970)
SIGPLAN Not.
, vol.5
, Issue.7
, pp. 1-19
-
-
Allen, F.E.1
-
3
-
-
84910678443
-
I forgot your password: Randomness attacks against PHP applications
-
B. Argyros and A. Kiayias. I forgot your password: Randomness attacks against PHP applications. In 21st USENIX Security Symposium, 2012.
-
(2012)
21st USENIX Security Symposium
-
-
Argyros, B.1
Kiayias, A.2
-
4
-
-
78650158728
-
Determinating timing channels in compute clouds
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi. Determinating timing channels in compute clouds. In 2010 ACM workshop on Cloud computing security workshop, pages 103-108, 2010.
-
(2010)
2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
5
-
-
84865516206
-
Efficient padding oracle attacks on cryptographic hardware
-
R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, and J.-K. Tsay. Efficient padding oracle attacks on cryptographic hardware. In Advances in Cryptology - CRYPTO 2012, pages 608-625. 2012.
-
(2012)
Advances in Cryptology - CRYPTO 2012
, pp. 608-625
-
-
Bardou, R.1
Focardi, R.2
Kawamoto, Y.3
Simionato, L.4
Steel, G.5
Tsay, J.-K.6
-
6
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
-
D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. In Advances in Cryptology - CRYPTO '98, pages 1-12, 1998.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
9
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern x86 processors
-
B. Coppens, I. Verbauwhede, K. De Bosschere, and B. De Sutter. Practical mitigations for timing-based side-channel attacks on modern x86 processors. In IEEE Symposium on Security and Privacy, pages 45-60, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Coppens, B.1
Verbauwhede, I.2
De Bosschere, K.3
De Sutter, B.4
-
10
-
-
84910657257
-
-
Personal communication, June
-
J. P. Crespo. Personal communication, June 2014.
-
(2014)
-
-
Crespo, J.P.1
-
12
-
-
84910650506
-
Lesser known security problems in PHP applications
-
S. Esser. Lesser known security problems in PHP applications. In Zend Conference, 2008.
-
(2008)
Zend Conference
-
-
Esser, S.1
-
15
-
-
84910649888
-
Wait a minute! A fast, cross-VM attack on AES
-
G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar. Wait a minute! A fast, cross-VM attack on AES. Cryptology ePrint Archive, 2014.
-
(2014)
Cryptology EPrint Archive
-
-
Irazoqui, G.1
Inci, M.S.2
Eisenbarth, T.3
Sunar, B.4
-
16
-
-
84865589043
-
Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption
-
T. Jager, S. Schinzel, and J. Somorovsky. Bleichenbacher's attack strikes again: breaking PKCS#1 v1.5 in XML encryption. In Computer Security - ESORICS 2012, pages 752-769. 2012.
-
(2012)
Computer Security - ESORICS 2012
, pp. 752-769
-
-
Jager, T.1
Schinzel, S.2
Somorovsky, J.3
-
18
-
-
85073538603
-
STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud
-
T. Kim, M. Peinado, and G. Mainar-Ruiz. STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud. In 21st USENIX Security Symposium, 2012.
-
(2012)
21st USENIX Security Symposium
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
20
-
-
84910619676
-
-
IDC Inc., November
-
R. P. Mahowald, C. W. Olofson, M.-C. Ballou, M. Fleming, and A. Hilwa. Worldwide competitive public Platform as a Service 2013-2017 forecast (Doc 243315). IDC Inc., November 2013.
-
(2013)
Worldwide Competitive Public Platform As A Service 2013-2017 Forecast (Doc 243315)
-
-
Mahowald, R.P.1
Olofson, C.W.2
Ballou, M.-C.3
Fleming, M.4
Hilwa, A.5
-
21
-
-
33745813464
-
The program counter security model: Automatic detection and removal of control-flow side channel attacks
-
D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In Information Security and Cryptology, pages 156-168, 2005.
-
(2005)
Information Security and Cryptology
, pp. 156-168
-
-
Molnar, D.1
Piotrowski, M.2
Schultz, D.3
Wagner, D.4
-
22
-
-
49049108738
-
An independent evaluation of web timing attack and its countermeasure
-
Y. Nagami, D. Miyamoto, H. Hazeyama, and Y. Kadobayashi. An independent evaluation of web timing attack and its countermeasure. In 3rd International Conference on Availability, Reliability and Security, pages 1319-1324, 2008.
-
(2008)
3rd International Conference on Availability, Reliability and Security
, pp. 1319-1324
-
-
Nagami, Y.1
Miyamoto, D.2
Hazeyama, H.3
Kadobayashi, Y.4
-
24
-
-
67650085819
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
June
-
N. Nethercote and J. Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. SIGPLAN Not., 42(6):89-100, June 2007.
-
(2007)
SIGPLAN Not.
, vol.42
, Issue.6
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
30
-
-
33646805500
-
Cache missing for fun and profit
-
C. Percival. Cache missing for fun and profit. In BSDCon 2005, 2005.
-
(2005)
BSDCon 2005
-
-
Percival, C.1
-
31
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
H. Raj, R. Nathuji, A. Singh, and P. England. Resource management for isolation enhanced cloud services. In 2009 ACM workshop on Cloud computing security, pages 77-84, 2009.
-
(2009)
2009 ACM workshop on Cloud computing security
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
32
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In 16th ACM Conference on Computer and Communications Security, pages 199-212, 2009.
-
(2009)
16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
34
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology, 23(1):37-71, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
39
-
-
80052008862
-
HomeAlone: Co-residency detection in the cloud via side-channel analysis
-
Y. Zhang, A. Juels, A. Oprea, and M.K. Reiter. HomeAlone: Co-residency detection in the cloud via side-channel analysis. In IEEE Symposium on Security and Privacy, pages 313-328, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
40
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM side channels and their use to extract private keys. In 2012 ACM Conference on Computer and Communications Security, pages 305-316, 2012.
-
(2012)
2012 ACM Conference on Computer and Communications Security
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
41
-
-
84889019424
-
Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
-
Y. Zhang and M. K. Reiter. Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. In 2013 ACM Conference on Computer and Communications Security, pages 827-838, 2013.
-
(2013)
2013 ACM Conference on Computer and Communications Security
, pp. 827-838
-
-
Zhang, Y.1
Reiter, M.K.2
|