-
1
-
-
79959534939
-
Yet another microarchitectural attack: Exploiting I-Cache
-
WS, Fairfax, VA, US, Nov
-
O. Aciiçmez, "Yet another microarchitectural attack: exploiting I-Cache," in Comp. Security Arch. WS, Fairfax, VA, US, Nov 2007, pp. 11-18.
-
(2007)
Comp. Security Arch
, pp. 11-18
-
-
Aciiçmez, O.1
-
2
-
-
43149120482
-
A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL
-
San Francisco, CA, US, Apr
-
O. Aciiçmez and W. Schindler, "A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL," in CT-RSA, San Francisco, CA, US, Apr 2008, pp. 256-273.
-
(2008)
CT-RSA
, pp. 256-273
-
-
Aciiçmez, O.1
Schindler, W.2
-
3
-
-
84876307879
-
On the power of simple branch prediction analysis
-
Singapore, Mar
-
O. Aciiçmez, Ç. K. Koç, and J.-P. Seifert, "On the power of simple branch prediction analysis," in ASIACCS, Singapore, Mar 2007, pp. 312-320.
-
(2007)
ASIACCS
, pp. 312-320
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
4
-
-
78049348331
-
New results on instruction cache attacks
-
Santa Barbara, CA, US, Apr
-
O. Aciiçmez, B. B. Brumley, and P. Grabher, "New results on instruction cache attacks," in CHES, Santa Barbara, CA, US, Apr 2010, pp. 110-124.
-
(2010)
CHES
, pp. 110-124
-
-
Aciiçmez, O.1
Brumley, B.B.2
Grabher, P.3
-
5
-
-
84921483196
-
'Ooh aah., just a little bit': A small amount of side channel can go a long way
-
Busan, KR, Sep
-
N. Benger, J. van de Pol, N. P. Smart, and Y. Yarom, "'Ooh aah., just a little bit': A small amount of side channel can go a long way," in CHES, Busan, KR, Sep 2014, pp. 75-92.
-
(2014)
CHES
, pp. 75-92
-
-
Benger, N.1
Pol De J.Van2
Smart, N.P.3
Yarom, Y.4
-
6
-
-
84866017720
-
The security impact of a new cryptographic library
-
Santiago, CL, Oct
-
D. J. Bernstein, T. Lange, and P. Schwabe, "The security impact of a new cryptographic library," in Conf. Cyptol-ogy & Inform. Security Latin America, Santiago, CL, Oct 2012, pp. 159-176.
-
(2012)
Conf. Cyptol-ogy & Inform. Security Latin America
, pp. 159-176
-
-
Bernstein, D.J.1
Lange, T.2
Schwabe, P.3
-
7
-
-
0000742754
-
Addition chain heuristics
-
Santa Barbara, CA, US, Aug
-
J. Bos and M. Coster, "Addition chain heuristics," in CRYPTO, Santa Barbara, CA, US, Aug 1989, pp. 400-407.
-
(1989)
CRYPTO
, pp. 400-407
-
-
Bos, J.1
Coster, M.2
-
8
-
-
72449122383
-
Cache-timing template attacks
-
B. B. Brumley and R. M. Hakala, "Cache-timing template attacks," in ASIACRYPT, 2009, pp. 667-684.
-
(2009)
ASIACRYPT
, pp. 667-684
-
-
Brumley, B.B.1
Hakala, R.M.2
-
9
-
-
84944905303
-
Universal exponentiation algorithm a first step towards Provable SPA-resistance
-
Paris, FR, May
-
C. Clavier and M. Joye, "Universal exponentiation algorithm a first step towards Provable SPA-resistance," in CHES, Paris, FR, May 2001, pp. 300-308.
-
(2001)
CHES
, pp. 300-308
-
-
Clavier, C.1
Joye, M.2
-
10
-
-
84910669114
-
The last mile: An empirical study of some timing channels on seL4
-
Scottsdale, AZ, US, Nov
-
D. Cock, Q. Ge, T. Murray, and G. Heiser, "The last mile: An empirical study of some timing channels on seL4," in CCS, Scottsdale, AZ, US, Nov 2014, pp. 570-581.
-
(2014)
CCS
, pp. 570-581
-
-
Cock, D.1
Ge, Q.2
Murray, T.3
Heiser, G.4
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," Trans. Inform. Theory, no. 4, pp. 469-472, Jul 1985.
-
(1985)
Trans. Inform. Theory
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
84905374631
-
RSA key extraction via low-bandwidth acoustic cryptanalysis
-
Santa Barbara, CA, US, Aug
-
D. Genkin, A. Shamir, and E. Tromer, "RSA key extraction via low-bandwidth acoustic cryptanalysis," in CRYPTO, Santa Barbara, CA, US, Aug 2014, pp. 444-461.
-
(2014)
CRYPTO
, pp. 444-461
-
-
Genkin, D.1
Shamir, A.2
Tromer, E.3
-
13
-
-
84930947524
-
Stealing keys from PCs by radio: Cheap electromagnetic attacks on windowed exponentiation
-
Feb
-
D. Genkin, L. Pachmanov, I. Pipman, and E. Tromer, "Stealing keys from PCs by radio: Cheap electromagnetic attacks on windowed exponentiation," Cryptology ePrint Archive, Report 2015/170, Feb 2015, http://eprint. iacr.org/.
-
(2015)
Cryptology EPrint Archive, Report 2015/170
-
-
Genkin, D.1
Pachmanov, L.2
Pipman, I.3
Tromer, E.4
-
15
-
-
0000490812
-
A survey of fast exponentiation methods
-
Apr
-
D. M. Gordon, "A survey of fast exponentiation methods," J. Algorithms, no. 1, pp. 129-146, Apr 1998.
-
(1998)
J. Algorithms
, Issue.1
, pp. 129-146
-
-
Gordon, D.M.1
-
16
-
-
80051974249
-
Cache games - Bringing access-based cache attacks on AES to practice
-
Oakland, CA, US, may
-
D. Gullasch, E. Bangerter, and S. Krenn, "Cache games - bringing access-based cache attacks on AES to practice," in Symp. Security & Privacy, Oakland, CA, US, may 2011, pp. 490-595.
-
(2011)
Symp. Security & Privacy
, pp. 490-595
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
17
-
-
0003684449
-
-
2nd ed. New York, NY, US: Springer Science+Business Media
-
T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data Mining, Inference and Prediction, 2nd ed. New York, NY, US: Springer Science+Business Media, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
18
-
-
0026156690
-
Reducing timing channels with fuzzy time
-
Oakland, CA, US, May
-
W.-M. Hu, "Reducing timing channels with fuzzy time," in Symp. Security & Privacy, Oakland, CA, US, May 1991, pp. 8-20.
-
(1991)
Symp. Security & Privacy
, pp. 8-20
-
-
Hu, W.-M.1
-
19
-
-
84881238589
-
Practical timing side channel attacks against kernel space ASLR
-
San Francisco, CA, US, May
-
R. Hund, C. Willems, and T. Holz, "Practical timing side channel attacks against kernel space ASLR," in Symp. Security & Privacy, San Francisco, CA, US, May 2013, pp. 191-205.
-
(2013)
Symp. Security & Privacy
, pp. 191-205
-
-
Hund, R.1
Willems, C.2
Holz, T.3
-
22
-
-
84906771418
-
Wait a minute! a fast, cross-VM attack on AES
-
Gothenburg, SE, Sep
-
G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar, "Wait a minute! a fast, cross-VM attack on AES," in RAID, Gothenburg, SE, Sep 2014, pp. 299-319.
-
(2014)
RAID
, pp. 299-319
-
-
Irazoqui, G.1
Inci, M.S.2
Eisenbarth, T.3
Sunar, B.4
-
23
-
-
84945194762
-
S$A: A shared cache attack that works across cores and defies VM sandboxing-and its application to AES
-
San Jose, CA, US, May
-
G. Irazoqui, T. Eisenbarth, and B. Sunar, "S$A: A shared cache attack that works across cores and defies VM sandboxing-and its application to AES," in IEEE: Security & Privacy, San Jose, CA, US, May 2015.
-
(2015)
IEEE: Security & Privacy
-
-
Irazoqui, G.1
Eisenbarth, T.2
Sunar, B.3
-
24
-
-
85073538603
-
STEALTH-mem: System-level protection against cache-based side channel attacks in the cloud
-
Bellevue, WA, US, Aug
-
T. Kim, M. Peindo, and G. Mainer-Ruiz, "STEALTH-MEM: System-level protection against cache-based side channel attacks in the Cloud," in USENIX Security, Bellevue, WA, US, Aug 2012.
-
(2012)
USENIX Security
-
-
Kim, T.1
Peindo, M.2
Mainer-Ruiz, G.3
-
25
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
Feb
-
V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions and reversals," Soviet Physics Doklady, p. 707, Feb 1966.
-
(1966)
Soviet Physics Doklady
, pp. 707
-
-
Levenshtein, V.I.1
-
26
-
-
0030646163
-
Preventing denial-of-service attacks on a μ-kernel for WebOSes
-
Cape Cod, MA, US, May
-
J. Liedtke, N. Islam, and T. Jaeger, "Preventing denial-of-service attacks on a μ-kernel for WebOSes," in 6th HotOS, Cape Cod, MA, US, May 1997, pp. 73-79.
-
(1997)
6th HotOS
, pp. 73-79
-
-
Liedtke, J.1
Islam, N.2
Jaeger, T.3
-
27
-
-
84944878354
-
-
C. Press, Ed. CRC Press
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, C. Press, Ed. CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
30
-
-
84945212779
-
How to benchmark code execution times on intel IA-32 and IA-64 instruction set architectures
-
Sep
-
G. Paoloni, How to Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures, Intel Corporation, Sep 2010.
-
(2010)
Intel Corporation
-
-
Paoloni, G.1
-
32
-
-
74049152260
-
Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, IL, US, Nov
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds," in CCS, Chicago, IL, US, Nov 2009, pp. 199-212.
-
(2009)
CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
33
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," CACM, no. 2, pp. 120-126, Feb 1978.
-
(1978)
CACM
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
34
-
-
74349098073
-
Efficient cache attacks in AES, and countermeasures
-
Jan
-
E. Tromer, D. A. Osvik, and A. Shamir, "Efficient cache attacks in AES, and countermeasures," J. Cryptology, no. 2, pp. 37-71, Jan 2010.
-
(2010)
J. Cryptology
, Issue.2
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
36
-
-
85008938648
-
Scheduler-based defenses against cross-VM side-channels
-
San Diego, CA, US, Aug
-
V. Varadarajan, T. Ristenpart, and M. Swift, "Scheduler-based defenses against cross-VM side-channels," in USENIX Security, San Diego, CA, US, Aug 2014, pp. 687-702.
-
(2014)
USENIX Security
, pp. 687-702
-
-
Varadarajan, V.1
Ristenpart, T.2
Swift, M.3
-
37
-
-
80955143535
-
Eliminating fine grained timers in Xen
-
Chicago, IL, US, Oct
-
B. C. Vattikonda, S. Das, and H. Shacham, "Eliminating fine grained timers in Xen," in CCSW, Chicago, IL, US, Oct 2011, pp. 41-46.
-
(2011)
CCSW
, pp. 41-46
-
-
Vattikonda, B.C.1
Das, S.2
Shacham, H.3
-
38
-
-
84945196398
-
-
VMware Inc., Palo Alto, CA, US
-
Large Page Performance, VMware Inc., Palo Alto, CA, US, 2008.
-
(2008)
Large Page Performance
-
-
-
39
-
-
84945212781
-
Security considerations and disallowing inter-virtual machine transparent page sharing
-
VMware Inc. Oct
-
VMware Inc., "Security considerations and disallowing inter-virtual machine transparent page sharing," VMware Knowledge Base 2080735 http://kb.vmware. com/selfservice/microsites/search.do?language=en-US& cmd=displayKC&externalId=2080735, Oct 2014.
-
(2014)
VMware Knowledge Base 2080735
-
-
-
40
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
Diego, CA, US, Jun
-
Z. Wang and R. B. Lee, "New Cache Designs for Thwarting Software Cache-based Side Channel Attacks," in ISCA, San Diego, CA, US, Jun 2007, pp. 494-505.
-
(2007)
ISCA, San
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
41
-
-
66749109266
-
A novel cache architecture with enhanced performance and security
-
Como, IT, Nov
-
-, "A Novel Cache Architecture with Enhanced Performance and Security," in MICRO, Como, IT, Nov 2008, pp. 83-93.
-
(2008)
MICRO
, pp. 83-93
-
-
Wang, Z.1
Lee, R.B.2
-
42
-
-
84945979212
-
Whispers in the hyperspace: High-speed covert channel attacks in the cloud
-
Bellevue, WA, US
-
Z. Wu, Z. Xu, and H. Wang, "Whispers in the hyperspace: High-speed covert channel attacks in the cloud," in USENIX Security, Bellevue, WA, US, 2012, pp. 159-173.
-
(2012)
USENIX Security
, pp. 159-173
-
-
Wu, Z.1
Xu, Z.2
Wang, H.3
-
43
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
Chicago, IL, US, Oct
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, "An exploration of L2 cache covert channels in virtualized environments," in CCSW, Chicago, IL, US, Oct 2011, pp. 29-40.
-
(2011)
CCSW
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
44
-
-
84906749327
-
Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack
-
Feb
-
Y. Yarom and N. Benger, "Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack," Cryptology ePrint Archive, Report 2014/140, Feb 2014, http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive, Report 2014/140
-
-
Yarom, Y.1
Benger, N.2
-
45
-
-
85076305746
-
FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack
-
San Diego, CA, US, Aug
-
Y. Yarom and K. Falkner, "FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack," in USENIX Security, San Diego, CA, US, Aug 2014, pp. 719-732.
-
(2014)
USENIX Security
, pp. 719-732
-
-
Yarom, Y.1
Falkner, K.2
-
46
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
Berkeley, CA, US, May
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, "Homealone: Co-residency detection in the cloud via side-channel analysis," in Symp. Security & Privacy, Berkeley, CA, US, May 2011, pp. 313-328.
-
(2011)
Symp. Security & Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
47
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
Raleigh, NC, US, Oct
-
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, "Cross-VM side channels and their use to extract private keys," in CCS, Raleigh, NC, US, Oct 2012, pp. 305-316.
-
(2012)
CCS
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
48
-
-
84910683194
-
Cross-tenant side-channel attacks in PaaS clouds
-
Scottsdale, AZ, US, Nov
-
-, "Cross-tenant side-channel attacks in PaaS clouds," in CCS, Scottsdale, AZ, US, Nov 2014, pp. 990-1003.
-
(2014)
CCS
, pp. 990-1003
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|