-
2
-
-
78049348331
-
New results on instruction cache attacks
-
Stefan Mangard and Franois-Xavier Standaert (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
O. Aciiçmez, B. Brumley, and P. Grabher. 2010. New results on instruction cache attacks. In Cryptographic Hardware and Embedded Systems (CHES'10), Stefan Mangard and Franois-Xavier Standaert (Eds.). Lecture Notes in Computer Science, Vol. 6225. Springer, Berlin, 110-124.
-
(2010)
Cryptographic Hardware and Embedded Systems (CHES'10)
, vol.6225
, pp. 110-124
-
-
Aciiçmez, O.1
Brumley, B.2
Grabher, P.3
-
3
-
-
84944627047
-
Predicting secret keys via branch prediction
-
Masayuki Abe (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
O. Aciiçmez, Ç. K. Koç, and J. Seifert. 2006. Predicting secret keys via branch prediction. In Topics in Cryptology (CT-RSA'07), Masayuki Abe (Ed.). Lecture Notes in Computer Science, Vol. 4377. Springer, Berlin, 225-242.
-
(2006)
Topics in Cryptology (CT-RSA'07)
, vol.4377
, pp. 225-242
-
-
Aciiçmez, O.1
Koç, Ç.K.2
Seifert, J.3
-
4
-
-
84876307879
-
On the power of simple branch prediction analysis
-
ACM, New York, NY
-
O. Aciiçmez, Ç. K. Koç, and J. Seifert. 2007. On the power of simple branch prediction analysis. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS'07). ACM, New York, NY, 312-320.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS'07)
, pp. 312-320
-
-
Aciiçmez, O.1
Koç, Ç.K.2
Seifert, J.3
-
5
-
-
33745773656
-
Improving Brumley and Boneh timing attack on unprotected SSL implementations
-
ACM, New York, NY
-
O. Aciiçmez, W. Schindler, and Ç.K. Koç. 2005. Improving Brumley and Boneh timing attack on unprotected SSL implementations. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). ACM, New York, NY, 139-146.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)
, pp. 139-146
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
6
-
-
85022027006
-
Cache based remote timing attack on the AES
-
Masayuki Abe (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
O. Aciiçmez, W. Schindler, and Ç. K. Koç. 2007. Cache based remote timing attack on the AES. In Topics in Cryptology (CT-RSA'07), Masayuki Abe (Ed.). Lecture Notes in Computer Science, Vol. 4377. Springer, Berlin, 271-286.
-
(2007)
Topics in Cryptology (CT-RSA'07)
, vol.4377
, pp. 271-286
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
9
-
-
84884855912
-
Attacking AES using bernsteins attack on modern processors
-
Amr Youssef, Abderrahmane Nitaj, and AboulElla Hassanien (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
H. Aly and M. ElGayyar. 2013. Attacking AES using bernsteins attack on modern processors. In Progress in Cryptology (AFRICACRYPT'13), Amr Youssef, Abderrahmane Nitaj, and AboulElla Hassanien (Eds.). Lecture Notes in Computer Science, Vol. 7918. Springer, Berlin, 127-139.
-
(2013)
Progress in Cryptology (AFRICACRYPT'13)
, vol.7918
, pp. 127-139
-
-
Aly, H.1
ElGayyar, M.2
-
13
-
-
84905712081
-
A comparative analysis of detection metrics for covert timing channels
-
2014
-
R. Archibald and D. Ghosal. 2014. A comparative analysis of detection metrics for covert timing channels. Computers & Security 45 (2014), 284-292.
-
(2014)
Computers & Security
, vol.45
, pp. 284-292
-
-
Archibald, R.1
Ghosal, D.2
-
14
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
ACM, New York, NY
-
A. Askarov, D. Zhang, and A. C. Myers. 2010. Predictive black-box mitigation of timing channels. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, New York, NY, 297-307.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 297-307
-
-
Askarov, A.1
Zhang, D.2
Myers, A.C.3
-
15
-
-
84884485543
-
Side-channel attacks on the McEliece and niederreiter public-key cryptosystems
-
2011
-
R. Avanzi, S. Hoerder, D. Page, and M. Tunstall. 2011. Side-channel attacks on the McEliece and niederreiter public-key cryptosystems. Journal of Cryptographic Engineering 1, 4 (2011), 271-281.
-
(2011)
Journal of Cryptographic Engineering
, vol.1
, Issue.4
, pp. 271-281
-
-
Avanzi, R.1
Hoerder, S.2
Page, D.3
Tunstall, M.4
-
17
-
-
0032022695
-
The information-theoretic capacity of discrete-time queues
-
March 1998
-
A. S. Bedekar and M. Azizoglu. 1998. The information-theoretic capacity of discrete-time queues. IEEE Transactions on Information Theory, 44, 2 (March 1998), 446-461.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.2
, pp. 446-461
-
-
Bedekar, A.S.1
Azizoglu, M.2
-
19
-
-
33744529805
-
-
Technical Report. Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago, Chicago, IL 606077045
-
D. J. Bernstein. 2005. Cache-Timing Attacks on AES. Technical Report. Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago, Chicago, IL 606077045.
-
(2005)
Cache-Timing Attacks on AES.
-
-
Bernstein, D.J.1
-
20
-
-
84997080053
-
Source authentication techniques for network-on-chip router configuration packets
-
Nov. 2016
-
A. K. Biswas. 2016. Source authentication techniques for network-on-chip router configuration packets. Journal of Emerging Technology in Computing Systems 13, 2, Article 28 (Nov. 2016), 31 pages. DOI:http://dx.doi.org/10.1145/2996194
-
(2016)
Journal of Emerging Technology in Computing Systems
, vol.13
, Issue.2
-
-
Biswas, A.K.1
-
21
-
-
35048848490
-
Provably secure masking of AES
-
Helena Handschuh and M. Anwar Hasan (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
J. Blomer, J. Guajardo, and V. Krummel. 2005. Provably secure masking of AES. In Selected Areas in Cryptography, Helena Handschuh and M. Anwar Hasan (Eds.). Lecture Notes in Computer Science, Vol. 3357. Springer, Berlin, 69-83.
-
(2005)
Selected Areas in Cryptography
, vol.3357
, pp. 69-83
-
-
Blomer, J.1
Guajardo, J.2
Krummel, V.3
-
22
-
-
77952033303
-
Differential cache-collision timing attacks on AES with applications to embedded CPUs
-
Josef Pieprzyk (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
A. Bogdanov, T. Eisenbarth, C. Paar, and M. Wienecke. 2010. Differential cache-collision timing attacks on AES with applications to embedded CPUs. In Topics in Cryptology (CT-RSA'10), Josef Pieprzyk (Ed.). Lecture Notes in Computer Science, Vol. 5985. Springer, Berlin, 235-251.
-
(2010)
Topics in Cryptology (CT-RSA'10)
, vol.5985
, pp. 235-251
-
-
Bogdanov, A.1
Eisenbarth, T.2
Paar, C.3
Wienecke, M.4
-
23
-
-
33750814106
-
Cache-collision timing attacks against AES
-
Louis Goubin and Mitsuru Matsui (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
J. Bonneau and I. Mironov. 2006. Cache-collision timing attacks against AES. In Cryptographic Hardware and Embedded Systems (CHES'06), Louis Goubin and Mitsuru Matsui (Eds.). Lecture Notes in Computer Science, Vol. 4249. Springer, Berlin, 201-215.
-
(2006)
Cryptographic Hardware and Embedded Systems (CHES'06)
, vol.4249
, pp. 201-215
-
-
Bonneau, J.1
Mironov, I.2
-
24
-
-
72449122383
-
Cache-timing template attacks
-
Mitsuru Matsui (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
B. Brumley and R. Hakala. 2009. Cache-timing template attacks. In Advances in Cryptology (ASIACRYPT'09), Mitsuru Matsui (Ed.). Lecture Notes in Computer Science, Vol. 5912. Springer, Berlin, 667-684.
-
(2009)
Advances in Cryptology (ASIACRYPT'09)
, vol.5912
, pp. 667-684
-
-
Brumley, B.1
Hakala, R.2
-
25
-
-
80052996390
-
Remote timing attacks are still practical
-
Vijay Atluri and Claudia Diaz (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
B. Brumley and N. Tuveri. 2011. Remote timing attacks are still practical. In Computer Security (ESORICS'11), Vijay Atluri and Claudia Diaz (Eds.). Lecture Notes in Computer Science, Vol. 6879. Springer, Berlin, 355-371.
-
(2011)
Computer Security (ESORICS'11)
, vol.6879
, pp. 355-371
-
-
Brumley, B.1
Tuveri, N.2
-
27
-
-
18844454571
-
Remote timing attacks are practical
-
2005
-
D. Brumley and D. Boneh. 2005. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
28
-
-
3042519430
-
An information-theoretic model for steganography
-
2004
-
C. Christian. 2004. An information-theoretic model for steganography. Information and Computation 192, 1 (2004), 41-56.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Christian, C.1
-
30
-
-
76849086598
-
IP covert channel detection
-
April 2009
-
S. Cabuk, C. E. Brodley, and C. Shields. 2009. IP covert channel detection. ACM Transactions on Information and System Security 12, 4, Article 22 (April 2009), 29 pages.
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.4
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
31
-
-
38049144929
-
Steganographic communication in ordered channels
-
Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. P. Rangan, and R. Sundaram. 2007. Steganographic communication in ordered channels. In Information Hiding, Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Lecture Notes in Computer Science, Vol. 4437. Springer, Berlin, 42-57.
-
(2007)
Information Hiding
, vol.4437
, pp. 42-57
-
-
Chakinala, R.C.1
Kumarasubramanian, A.2
Manokaran, R.3
Noubir, G.4
Rangan, C.P.5
Sundaram, R.6
-
33
-
-
84868662709
-
Improvement of trace-driven i-cache timing attack on the {RSA} algorithm
-
2013
-
C. Chen, T. Wang, Y. Kou, X. Chen, and X. Li. 2013b. Improvement of trace-driven i-cache timing attack on the {RSA} algorithm. Journal of Systems and Software 86, 1 (2013), 100-107.
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.1
, pp. 100-107
-
-
Chen, C.1
Wang, T.2
Kou, Y.3
Chen, X.4
Li, X.5
-
34
-
-
84875455431
-
Improving timing attack on RSA-CRT via error detection and correction strategy
-
2013
-
C. Chen, T. Wang, and J. Tian. 2013a. Improving timing attack on RSA-CRT via error detection and correction strategy. Information Sciences 232 (2013), 464-474.
-
(2013)
Information Sciences
, vol.232
, pp. 464-474
-
-
Chen, C.1
Wang, T.2
Tian, J.3
-
36
-
-
84894447348
-
Parallel FPGA implementation of RSA with residue number systems - Can side-channel threats be avoided?
-
M. Ciet, M. Neve, E. Peeters, and J.-J. Quisquater. 2003. Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided? In Proceedings of the 2003 IEEE 46th Midwest Symposium on Circuits and Systems, Vol. 2, 806-810.
-
(2003)
Proceedings of the 2003 IEEE 46th Midwest Symposium on Circuits and Systems
, vol.2
, pp. 806-810
-
-
Ciet, M.1
Neve, M.2
Peeters, E.3
Quisquater, J.-J.4
-
37
-
-
77952688146
-
Side-channel attack mitigation using dual-spacer dual-rail delay-insensitive logic (D3L)
-
W. Cilio, M. Linder, C. Porter, J. Di, S. Smith, and D. Thompson. 2010. Side-channel attack mitigation using dual-spacer dual-rail delay-insensitive logic (D3L). In Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon'10). 471-474.
-
(2010)
Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon'10)
, pp. 471-474
-
-
Cilio, W.1
Linder, M.2
Porter, C.3
Di, J.4
Smith, S.5
Thompson, D.6
-
38
-
-
84893693485
-
Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic
-
2013
-
W. Cilio, M. Linder, C. Porter, J. Di, D. R. Thompson, and S. C. Smith. 2013. Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic. Microelectronics Journal 44, 3 (2013), 258-269.
-
(2013)
Microelectronics Journal
, vol.44
, Issue.3
, pp. 258-269
-
-
Cilio, W.1
Linder, M.2
Porter, C.3
Di, J.4
Thompson, D.R.5
Smith, S.C.6
-
39
-
-
51849162372
-
Practical codes for queueing channels: An algebraic, state-space, message-passing approach
-
T. P. Coleman and N. Kiyavash. 2008a. Practical codes for queueing channels: An algebraic, state-space, message-passing approach. In IEEE Information Theory Workshop, 2008 (ITW'08). 318-322.
-
(2008)
IEEE Information Theory Workshop, 2008 (ITW'08)
, pp. 318-322
-
-
Coleman, T.P.1
Kiyavash, N.2
-
41
-
-
60349110770
-
Opportunities and limits of remote timing attacks
-
Jan. 2009
-
S. A. Crosby, D. S. Wallach, and R. H. Riedi. 2009. Opportunities and limits of remote timing attacks. ACM Transactions on Information and System Security 12, 3, Article 17 (Jan. 2009), 29 pages.
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
-
-
Crosby, S.A.1
Wallach, D.S.2
Riedi, R.H.3
-
42
-
-
0003969633
-
-
Department of Defense Standard. Technical Report 1985
-
Department of Defense Standard. 1985. Trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD (1985).
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
43
-
-
84954462346
-
A practical implementation of the timing attack
-
Jean-Jacques Quisquater and Bruce Schneier (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
J. Dhem, F. Koeune, P. Leroux, P. Mestre, J. Quisquater, and J. Willems. 2000. A practical implementation of the timing attack. In Smart Card Research and Applications, Jean-Jacques Quisquater and Bruce Schneier (Eds.). Lecture Notes in Computer Science, Vol. 1820. Springer, Berlin, 167-182.
-
(2000)
Smart Card Research and Applications
, vol.1820
, pp. 167-182
-
-
Dhem, J.1
Koeune, F.2
Leroux, P.3
Mestre, P.4
Quisquater, J.5
Willems, J.6
-
44
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association, Berkeley, CA
-
R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, Berkeley, CA, 1-17.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM'04)
, pp. 1-17
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
45
-
-
84958977733
-
-
Springer, Berlin
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford. 2002. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Springer, Berlin, 17-35.
-
(2002)
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
, pp. 17-35
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
48
-
-
70349686635
-
Building covert channels over the packet reordering phenomenon
-
A. El-Atawy and E. Al-Shaer. 2009. Building covert channels over the packet reordering phenomenon. In IEEE INFOCOM 2009. 2186-2194.
-
(2009)
IEEE INFOCOM 2009
, pp. 2186-2194
-
-
El-Atawy, A.1
Al-Shaer, E.2
-
51
-
-
79960973241
-
Petrel: Power and timing attack resistant elliptic curve scalar multiplier based on programmable GF(p) arithmetic unit
-
Aug. 2011
-
S. Ghosh, D. Mukhopadhyay, and D. Roychowdhury. 2011. Petrel: Power and timing attack resistant elliptic curve scalar multiplier based on programmable GF(p) arithmetic unit. IEEE Transactions on Circuits and Systems I: Regular Papers, 58, 8 (Aug. 2011), 1798-1812.
-
(2011)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.58
, Issue.8
, pp. 1798-1812
-
-
Ghosh, S.1
Mukhopadhyay, D.2
Roychowdhury, D.3
-
52
-
-
84901018745
-
BLAKE-512-based 128-bit CCA2 secure timing attack resistant McEliece cryptoprocessor
-
May 2014
-
S. Ghosh and I. Verbauwhede. 2014. BLAKE-512-based 128-bit CCA2 secure timing attack resistant McEliece cryptoprocessor. IEEE Transactions on Computers, 63, 5 (May 2014), 1124-1133.
-
(2014)
IEEE Transactions on Computers
, vol.63
, Issue.5
, pp. 1124-1133
-
-
Ghosh, S.1
Verbauwhede, I.2
-
54
-
-
80052899318
-
An entropy-based approach to detecting covert timing channels
-
Nov.-Dec. 2011
-
S. Gianvecchio and H. Wang. 2011. An entropy-based approach to detecting covert timing channels. IEEE Transactions on Dependable and Secure Computing, 8, 6 (Nov.-Dec. 2011), 785-797.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.6
, pp. 785-797
-
-
Gianvecchio, S.1
Wang, H.2
-
55
-
-
56549128365
-
Model-based covert timing channels: Automated modeling and evasion
-
Springer-Verlag, Berlin
-
S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia. 2008. Model-based covert timing channels: Automated modeling and evasion. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). Springer-Verlag, Berlin, 211-230.
-
(2008)
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08)
, pp. 211-230
-
-
Gianvecchio, S.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
56
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
Sep. 2002
-
J. Giles and B. Hajek. 2002. An information-theoretic and game-theoretic study of timing channels. IEEE Transactions on Information Theory, 48, 9 (Sep. 2002), 2455-2477.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
61
-
-
84887035165
-
Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors
-
Nov. 2013
-
X. Gong, M. Rodrigues, and N. Kiyavash. 2013. Invisible flow watermarks for channels with dependent substitution, deletion, and bursty insertion errors. IEEE Transactions on Information Forensics and Security, 8, 11 (Nov. 2013), 1850-1859.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.11
, pp. 1850-1859
-
-
Gong, X.1
Rodrigues, M.2
Kiyavash, N.3
-
62
-
-
85015284629
-
A side-channel timing attack of the MSP430 BSL
-
T. Goodspeed. 2008. A side-channel timing attack of the MSP430 BSL. In Black Hat USA 2008.
-
(2008)
Black Hat USA 2008
-
-
Goodspeed, T.1
-
63
-
-
78651322211
-
Directed information and the NRL network pump
-
S. K. Gorantla, S. Kadloor, T. P. Coleman, N. Kiyavash, I. S. Moskowitz, and M. H. Kang. 2010. Directed information and the NRL network pump. In Proceedings of the 2010 International Symposium on Information Theory and its Applications (ISITA'10). 343-348.
-
(2010)
Proceedings of the 2010 International Symposium on Information Theory and Its Applications (ISITA'10)
, pp. 343-348
-
-
Gorantla, S.K.1
Kadloor, S.2
Coleman, T.P.3
Kiyavash, N.4
Moskowitz, I.S.5
Kang, M.H.6
-
64
-
-
84855911728
-
Characterizing the efficacy of the NRL network pump in mitigating covert timing channels
-
Feb. 2012
-
S. K. Gorantla, S. Kadloor, N. Kiyavash, T. P. Coleman, I. S. Moskowitz, and M. H. Kang. 2012. Characterizing the efficacy of the NRL network pump in mitigating covert timing channels. IEEE Transactions on Information Forensics and Security, 7, 1 (Feb. 2012), 64-75.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.1
, pp. 64-75
-
-
Gorantla, S.K.1
Kadloor, S.2
Kiyavash, N.3
Coleman, T.P.4
Moskowitz, I.S.5
Kang, M.H.6
-
65
-
-
64949133467
-
-
Technical Report Revision 3.01. Intel Corporation, Intel Architecture Group, Israel Development Center
-
S. Gueron. 2012. Intel Advanced Encryption Standard (AES) New Instructions Set. Technical Report 323641-001, Revision 3.01. Intel Corporation, Intel Architecture Group, Israel Development Center.
-
(2012)
Intel Advanced Encryption Standard (AES) New Instructions Set
-
-
Gueron, S.1
-
67
-
-
85017093014
-
Strength of two data encryption standard implementations under timing attacks
-
Nov. 1999
-
A. Hevia and M. Kiwi. 1999. Strength of two data encryption standard implementations under timing attacks. ACM Transactions on Information and System Security 2, 4 (Nov. 1999), 416-437.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 416-437
-
-
Hevia, A.1
Kiwi, M.2
-
68
-
-
24744431860
-
A scalable and high performance elliptic curve processor with resistance to timing attacks
-
A. Hodjat, D. D. Hwang, and I. Verbauwhede. 2005. A scalable and high performance elliptic curve processor with resistance to timing attacks. In Proceedings of the International Conference on Information Technology: Coding and Computing, 2005 (ITCC'05), Vol. 1, 538-543.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing, 2005 (ITCC'05)
, vol.1
, pp. 538-543
-
-
Hodjat, A.1
Hwang, D.D.2
Verbauwhede, I.3
-
69
-
-
80053031972
-
CoCo: Coding-based covert timing channels for network flows
-
Toms Filler, Toms Pevn, Scott Craver, and Andrew D. Ker (Eds.), Springer
-
A. Houmansadr and N. Borisov. 2011a. CoCo: Coding-based covert timing channels for network flows. In Information Hiding (Lecture Notes in Computer Science), Toms Filler, Toms Pevn, Scott Craver, and Andrew D. Ker (Eds.), Vol. 6958. Springer, 314-328.
-
(2011)
Information Hiding (Lecture Notes in Computer Science)
, vol.6958
, pp. 314-328
-
-
Houmansadr, A.1
Borisov, N.2
-
72
-
-
84872680683
-
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
-
2013
-
A. Houmansadr and N. Borisov. 2013a. BotMosaic: Collaborative network watermark for the detection of IRC-based botnets. Journal of Systems and Software 86, 3 (2013), 707-715.
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.3
, pp. 707-715
-
-
Houmansadr, A.1
Borisov, N.2
-
73
-
-
84884930303
-
The need for flow fingerprints to link correlated network flows
-
Emiliano De Cristofaro and Matthew Wright (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
A. Houmansadr and N. Borisov. 2013b. The need for flow fingerprints to link correlated network flows. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Matthew Wright (Eds.). Lecture Notes in Computer Science, Vol. 7981. Springer, Berlin, 205-224.
-
(2013)
Privacy Enhancing Technologies
, vol.7981
, pp. 205-224
-
-
Houmansadr, A.1
Borisov, N.2
-
74
-
-
70349207215
-
Multi-flow attack resistant watermarks for network flows
-
A. Houmansadr, N. Kiyavash, and N. Borisov. 2009a. Multi-flow attack resistant watermarks for network flows. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 2009 (ICASSP'09). 1497-1500.
-
(2009)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 2009 (ICASSP'09)
, pp. 1497-1500
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
76
-
-
84907600501
-
Non-blind watermarking of network flows
-
Aug. 2014
-
A. Houmansadr, N. Kiyavash, and N. Borisov. 2014. Non-blind watermarking of network flows. IEEE/ACM Transactions on Networking, 22, 4 (Aug. 2014), 1232-1244.
-
(2014)
IEEE/ACM Transactions on Networking
, vol.22
, Issue.4
, pp. 1232-1244
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
78
-
-
84861145031
-
On the complexity of generating gate level information flow tracking logic
-
June 2012
-
W. Hu, J. Oberg, A. Irturk, M. Tiwari, T. Sherwood, D. Mu, and R. Kastner. 2012. On the complexity of generating gate level information flow tracking logic. IEEE Transactions on Information Forensics and Security, 7, 3 (June 2012), 1067-1080.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 1067-1080
-
-
Hu, W.1
Oberg, J.2
Irturk, A.3
Tiwari, M.4
Sherwood, T.5
Mu, D.6
Kastner, R.7
-
79
-
-
79960877511
-
Long PN code based DSSS watermarking
-
J. Huang, X. Pan, X. Fu, and J. Wang. 2011. Long PN code based DSSS watermarking. In Proceedings of IEEE INFOCOM, 2011. 2426-2434.
-
(2011)
Proceedings of IEEE INFOCOM, 2011
, pp. 2426-2434
-
-
Huang, J.1
Pan, X.2
Fu, X.3
Wang, J.4
-
81
-
-
84897017345
-
On the necessary conditions for covert channel existence: A state-of-the-art survey
-
2012
-
J. Jaskolka, R. Khedri, and Q. Zhang. 2012. On the necessary conditions for covert channel existence: A state-of-the-art survey. Procedia Computer Science 10 (2012), 458-465.
-
(2012)
Procedia Computer Science
, vol.10
, pp. 458-465
-
-
Jaskolka, J.1
Khedri, R.2
Zhang, Q.3
-
82
-
-
70349666876
-
Blind detection of spread spectrum flow watermarks
-
W. Jia, F. P. Tso, Z. Ling, X. Fu, D. Xuan, and W. Yu. 2009. Blind detection of spread spectrum flow watermarks. In IEEE INFOCOM 2009. 2195-2203.
-
(2009)
IEEE INFOCOM 2009
, pp. 2195-2203
-
-
Jia, W.1
Tso, F.P.2
Ling, Z.3
Fu, X.4
Xuan, D.5
Yu, W.6
-
83
-
-
84958769993
-
Side channel cryptanalysis of product ciphers
-
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall. 1998. Side channel cryptanalysis of product ciphers. In Computer Security (ESORICS'98), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann (Eds.). Lecture Notes in Computer Science, Vol. 1485. Springer, Berlin, 97-110.
-
(1998)
Computer Security (ESORICS'98)
, vol.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
85
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
Aug. 1983
-
R. A. Kemmerer. 1983. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Transactions on Computer Systems 1, 3 (Aug. 1983), 256-277.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
87
-
-
77951604539
-
Embedding a covert channel in active network connections
-
H. Khan, Y. Javed, F. Mirza, and S. A. Khayam. 2009. Embedding a covert channel in active network connections. In Proceedings of the IEEE Global Telecommunications Conference, 2009 (GLOBECOM'09). 1-6.
-
(2009)
Proceedings of the IEEE Global Telecommunications Conference, 2009 (GLOBECOM'09)
, pp. 1-6
-
-
Khan, H.1
Javed, Y.2
Mirza, F.3
Khayam, S.A.4
-
90
-
-
84874588781
-
A timing channel spyware for the CSMA/CA protocol
-
March 2013
-
N. Kiyavash, F. Koushanfar, T. P. Coleman, and M. Rodrigues. 2013. A timing channel spyware for the CSMA/CA protocol. IEEE Transactions on Information Forensics and Security, 8, 3 (March 2013), 477-487.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.3
, pp. 477-487
-
-
Kiyavash, N.1
Koushanfar, F.2
Coleman, T.P.3
Rodrigues, M.4
-
91
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Neal Koblitz (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
P. C. Kocher. 1996. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In Advances in Cryptology (CRYPTO'96), Neal Koblitz (Ed.). Lecture Notes in Computer Science, Vol. 1109. Springer, Berlin, 104-113.
-
(1996)
Advances in Cryptology (CRYPTO'96)
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
92
-
-
24144497857
-
-
Technical Report Universite catholique de Louvain, Departement d Electricite (DICE), Belgium
-
F. Koeune and J. Quisquater. 1999. A Timing Attack Against Rijndael. Technical Report CG-1999/1. Universite catholique de Louvain, Departement d Electricite (DICE), Belgium.
-
(1999)
A Timing Attack Against Rijndael
-
-
Koeune, F.1
Quisquater, J.2
-
93
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
ACM, New York, NY
-
J. Kong, O. Aciiçmez, J. Seifert, and H. Zhou. 2008. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 2nd ACM Workshop on Computer Security Architectures (CSAW'08). ACM, New York, NY, 25-34.
-
(2008)
Proceedings of the 2nd ACM Workshop on Computer Security Architectures (CSAW'08)
, pp. 25-34
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.3
Zhou, H.4
-
94
-
-
64949105813
-
Hardware-software integrated approaches to defend against software cache-based side channel attacks
-
J. Kong, O. Aciicmez, J. P. Seifert, and H. Zhou. 2009. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In Proceedings of the IEEE 15th International Symposium on High Performance Computer Architecture, 2009 (HPCA'09). 393-404.
-
(2009)
Proceedings of the IEEE 15th International Symposium on High Performance Computer Architecture, 2009 (HPCA'09)
, pp. 393-404
-
-
Kong, J.1
Aciicmez, O.2
Seifert, J.P.3
Zhou, H.4
-
95
-
-
43149087564
-
A fast and cache-timing resistant implementation of the AES
-
Tal Malkin (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
R. Konighofer. 2008. A fast and cache-timing resistant implementation of the AES. In Topics in Cryptology (CT-RSA'08), Tal Malkin (Ed.). Lecture Notes in Computer Science, Vol. 4964. Springer, Berlin, 187-202.
-
(2008)
Topics in Cryptology (CT-RSA'08)
, vol.4964
, pp. 187-202
-
-
Konighofer, R.1
-
96
-
-
84875224405
-
Mimic: An active covert channel that evades regularity-based detection
-
2013
-
K. Kothari and M. Wright. 2013. Mimic: An active covert channel that evades regularity-based detection. Computer Networks 57, 3 (2013), 647-657.
-
(2013)
Computer Networks
, vol.57
, Issue.3
, pp. 647-657
-
-
Kothari, K.1
Wright, M.2
-
97
-
-
70350594114
-
Faster and timing-attack resistant AES-GCM
-
Christophe Clavier and Kris Gaj (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
E. Ksper and P. Schwabe. 2009. Faster and timing-attack resistant AES-GCM. In Cryptographic Hardware and Embedded Systems (CHES'09), Christophe Clavier and Kris Gaj (Eds.). Lecture Notes in Computer Science, Vol. 5747. Springer, Berlin, 1-17.
-
(2009)
Cryptographic Hardware and Embedded Systems (CHES'09)
, vol.5747
, pp. 1-17
-
-
Ksper, E.1
Schwabe, P.2
-
98
-
-
0015672289
-
A note on the confinement problem
-
Oct. 1973
-
B. W. Lampson. 1973. A note on the confinement problem. Communications of the ACM 16, 10 (Oct. 1973), 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
99
-
-
85047979766
-
PHY covert channels: Can you see the idles?
-
USENIX Association, Berkeley, CA
-
K. S. Lee, H. Wang, and H. Weatherspoon. 2014. PHY covert channels: Can you see the idles? In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI'14). USENIX Association, Berkeley, CA, 173-185.
-
(2014)
Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI'14)
, pp. 173-185
-
-
Lee, K.S.1
Wang, H.2
Weatherspoon, H.3
-
102
-
-
84859617251
-
Network covert timing channel with distribution matching
-
2012
-
G. Liu, J. Zhai, and Y. Dai. 2012. Network covert timing channel with distribution matching. Telecommunication Systems 49, 2 (2012), 199-205.
-
(2012)
Telecommunication Systems
, vol.49
, Issue.2
, pp. 199-205
-
-
Liu, G.1
Zhai, J.2
Dai, Y.3
-
104
-
-
84905705959
-
Hide and seek in time - Robust covert timing channels
-
Y. Liu, F. Armknecht, D. Ghosal, S. Katzenbeisser, A. Sadeghi, and S. Schulz. 2009. Hide and seek in time - robust covert timing channels. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09).
-
(2009)
Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09)
-
-
Liu, Y.1
Armknecht, F.2
Ghosal, D.3
Katzenbeisser, S.4
Sadeghi, A.5
Schulz, S.6
-
105
-
-
78549231319
-
Robust and undetectable steganographic timing channels for i.i.d. traffic
-
Rainer Bhme, Philip W. L. Fong, and Reihaneh Safavi-Naini (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
Y. Liu, D. Ghosal, F. Armknecht, A. R. Sadeghi, S. Schulz, and S. Katzenbeisser. 2010. Robust and undetectable steganographic timing channels for i.i.d. traffic. In Information Hiding, Rainer Bhme, Philip W. L. Fong, and Reihaneh Safavi-Naini (Eds.). Lecture Notes in Computer Science, Vol. 6387. Springer, Berlin, 193-207.
-
(2010)
Information Hiding
, vol.6387
, pp. 193-207
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
Sadeghi, A.R.4
Schulz, S.5
Katzenbeisser, S.6
-
106
-
-
82155195910
-
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback
-
2012
-
J. Luo, X. Wang, and M. Yang. 2012b. An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. Journal of Network and Computer Applications 35, 1 (2012), 60-71.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.1
, pp. 60-71
-
-
Luo, J.1
Wang, X.2
Yang, M.3
-
107
-
-
38049094594
-
Cloak: A ten-fold way for reliable covert communications
-
Joachim Biskup and Javier Lpez (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
X. Luo, E. W. W. Chan, and R. K. C. Chang. 2007. Cloak: A ten-fold way for reliable covert communications. In Computer Security (ESORICS'07), Joachim Biskup and Javier Lpez (Eds.). Lecture Notes in Computer Science, Vol. 4734. Springer, Berlin, 283-298.
-
(2007)
Computer Security (ESORICS'07)
, vol.4734
, pp. 283-298
-
-
Luo, X.1
Chan, E.W.W.2
Chang, R.K.C.3
-
109
-
-
84866625734
-
Robust network covert communications based on TCP and enumerative combinatorics
-
Nov 2012
-
X. Luo, E. W. W. Chan, P. Zhou, and R. K. C. Chang. 2012a. Robust network covert communications based on TCP and enumerative combinatorics. IEEE Transactions on Dependable and Secure Computing, 9, 6 (Nov 2012), 890-902.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 890-902
-
-
Luo, X.1
Chan, E.W.W.2
Zhou, P.3
Chang, R.K.C.4
-
110
-
-
78049368157
-
On the secrecy of spread-spectrum flow watermarks
-
Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
X. Luo, J. Zhang, R. Perdisci, and W. Lee. 2010. On the secrecy of spread-spectrum flow watermarks. In Computer Security (ESORICS'10), Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou (Eds.). Lecture Notes in Computer Science, Vol. 6345. Springer, Berlin, 232-248.
-
(2010)
Computer Security (ESORICS'10)
, vol.6345
, pp. 232-248
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
-
111
-
-
84862967527
-
Exposing invisible timing-based traffic watermarks with BACKLIT
-
ACM, New York, NY
-
X. Luo, P. Zhou, J. Zhang, R. Perdisci, W. Lee, and R. K. C. Chang. 2011. Exposing invisible timing-based traffic watermarks with BACKLIT. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11). ACM, New York, NY, 197-206.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11)
, pp. 197-206
-
-
Luo, X.1
Zhou, P.2
Zhang, J.3
Perdisci, R.4
Lee, W.5
Chang, R.K.C.6
-
115
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
1992
-
I. S. Moskowitz and A. R. Miller. 1992. The channel capacity of a certain noisy timing channel. IEEE Transactions on Information Theory 38, 4 (1992), 1339-1344.
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.4
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
116
-
-
84855987565
-
Feature extraction and classification algorithm for detecting complex covert timing channel
-
2012
-
S. Mou, Z. Zhao, S. Jiang, Z. Wu, and J. Zhu. 2012. Feature extraction and classification algorithm for detecting complex covert timing channel. Computers and Security 31, 1 (2012), 70-82.
-
(2012)
Computers and Security
, vol.31
, Issue.1
, pp. 70-82
-
-
Mou, S.1
Zhao, Z.2
Jiang, S.3
Wu, Z.4
Zhu, J.5
-
117
-
-
84869789994
-
Are AES x86 cache timing attacks still feasible?
-
ACM, New York, NY
-
K. Mowery, S. Keelveedhi, and H. Shacham. 2012. Are AES x86 cache timing attacks still feasible? In Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop (CCSW'12). ACM, New York, NY, 19-24.
-
(2012)
Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop (CCSW'12)
, pp. 19-24
-
-
Mowery, K.1
Keelveedhi, S.2
Shacham, H.3
-
118
-
-
77956215123
-
Theoretical analysis of gate level information flow tracking
-
ACM, New York, NY
-
J. Oberg, W. Hu, A. Irturk, M. Tiwari, T. Sherwood, and R. Kastner. 2010. Theoretical analysis of gate level information flow tracking. In Proceedings of the 47th Design Automation Conference (DAC'10). ACM, New York, NY, 244-247.
-
(2010)
Proceedings of the 47th Design Automation Conference (DAC'10)
, pp. 244-247
-
-
Oberg, J.1
Hu, W.2
Irturk, A.3
Tiwari, M.4
Sherwood, T.5
Kastner, R.6
-
119
-
-
80052647601
-
Information flow isolation in I2C and USB
-
ACM, New York, NY
-
J. Oberg, W. Hu, A. Irturk, M. Tiwari, T. Sherwood, and R. Kastner. 2011. Information flow isolation in I2C and USB. In Proceedings of the 48th Design Automation Conference (DAC'11). ACM, New York, NY, 254-259.
-
(2011)
Proceedings of the 48th Design Automation Conference (DAC'11)
, pp. 254-259
-
-
Oberg, J.1
Hu, W.2
Irturk, A.3
Tiwari, M.4
Sherwood, T.5
Kastner, R.6
-
120
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
David Pointcheval (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
D. Osvik, A. Shamir, and E. Tromer. 2006. Cache attacks and countermeasures: The case of AES. In Topics in Cryptology (CT-RSA'06), David Pointcheval (Ed.). Lecture Notes in Computer Science, Vol. 3860. Springer, Berlin, 1-20.
-
(2006)
Topics in Cryptology (CT-RSA'06)
, vol.3860
, pp. 1-20
-
-
Osvik, D.1
Shamir, A.2
Tromer, E.3
-
121
-
-
72349100468
-
A watermarking-based host correlation detection scheme
-
Z. Pan, H. Peng, X. Long, C. Zhang, and Y. Wu. 2009. A watermarking-based host correlation detection scheme. In Proceedings of the International Conference on Management of e-Commerce and e-Government, 2009 (ICMECG'09). 493-497.
-
(2009)
Proceedings of the International Conference on Management of E-Commerce and E-Government, 2009 (ICMECG'09)
, pp. 493-497
-
-
Pan, Z.1
Peng, H.2
Long, X.3
Zhang, C.4
Wu, Y.5
-
123
-
-
85116427392
-
Active timing-based correlation of perturbed traffic flows with chaff packets
-
P. Peng, P. Ning, D. S. Reeves, and X. Wang. 2005. Active timing-based correlation of perturbed traffic flows with chaff packets. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, 2005. 107-113.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, 2005
, pp. 107-113
-
-
Peng, P.1
Ning, P.2
Reeves, D.S.3
Wang, X.4
-
125
-
-
84862800623
-
Interval-based flow watermarking for tracing interactive traffic
-
2012
-
Y. J. Pyun, Y. Park, D. S. Reeves, X. Wang, and P. Ning. 2012. Interval-based flow watermarking for tracing interactive traffic. Computer Networks 56, 5 (2012), 1646-1665.
-
(2012)
Computer Networks
, vol.56
, Issue.5
, pp. 1646-1665
-
-
Pyun, Y.J.1
Park, Y.2
Reeves, D.S.3
Wang, X.4
Ning, P.5
-
126
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
IEEE
-
Y. J. Pyun, Y. H. Park, X. Wang, D. S. Reeves, and P. Ning. 2007. Tracing traffic through intermediate hosts that repacketize flows. In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM'07). IEEE. 634-642.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM'07)
, pp. 634-642
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
129
-
-
84865596182
-
The silence of the LANs: Efficient leakage resilience for IPsec VPNs
-
Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
A. R. Sadeghi, S. Schulz, and V. Varadharajan. 2012. The silence of the LANs: Efficient leakage resilience for IPsec VPNs. In Computer Security (ESORICS'12), Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Lecture Notes in Computer Science, Vol. 7459. Springer, Berlin, 253-270.
-
(2012)
Computer Security (ESORICS'12)
, vol.7459
, pp. 253-270
-
-
Sadeghi, A.R.1
Schulz, S.2
Varadharajan, V.3
-
131
-
-
85099426899
-
A timing attack against RSA with the chinese remainder theorem
-
ÇetinK Koç and Christof Paar (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
W. Schindler. 2000. A timing attack against RSA with the chinese remainder theorem. In Cryptographic Hardware and Embedded Systems (CHES'00), ÇetinK Koç and Christof Paar (Eds.). Lecture Notes in Computer Science, Vol. 1965. Springer, Berlin, 109-124.
-
(2000)
Cryptographic Hardware and Embedded Systems (CHES'00)
, vol.1965
, pp. 109-124
-
-
Schindler, W.1
-
132
-
-
84958960266
-
A combined timing and power attack
-
David Naccache and Pascal Paillier (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
W. Schindler. 2002. A combined timing and power attack. In Public Key Cryptography, David Naccache and Pascal Paillier (Eds.). Lecture Notes in Computer Science, Vol. 2274. Springer, Berlin, 263-279.
-
(2002)
Public Key Cryptography
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
133
-
-
84940654934
-
Timing channel capacity for uniform and gaussian servers
-
S. H. Sellke, N. B. Shroff, S. Bagchi, C. 2006. Timing channel capacity for uniform and gaussian servers. In Proceedings of the 44th Annual Allerton Conference on Communication, Control, and Computing.
-
(2006)
Proceedings of the 44th Annual Allerton Conference on Communication, Control, and Computing
-
-
Sellke, S.H.1
Shroff, N.B.2
Bagchi, C.S.3
-
136
-
-
77954596095
-
A timing attack against patterson algorithm in the McEliece PKC
-
Donghoon Lee and Seokhie Hong (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
A. Shoufan, F. Strenzke, H. G. Molter, and M. Stottinger. 2010. A timing attack against patterson algorithm in the McEliece PKC. In Information, Security and Cryptology (ICISC'09), Donghoon Lee and Seokhie Hong (Eds.). Lecture Notes in Computer Science, Vol. 5984. Springer, Berlin, 161-175.
-
(2010)
Information, Security and Cryptology (ICISC'09)
, vol.5984
, pp. 161-175
-
-
Shoufan, A.1
Strenzke, F.2
Molter, H.G.3
Stottinger, M.4
-
138
-
-
84904082242
-
An event-based unified system model to characterize and evaluate timing covert channels
-
March 2016
-
P. L. Shrestha, M. Hempel, H. Sharif, and H. H. Chen. 2016. An event-based unified system model to characterize and evaluate timing covert channels. IEEE Systems Journal 10, 1 (March 2016), 271-280.
-
(2016)
IEEE Systems Journal
, vol.10
, Issue.1
, pp. 271-280
-
-
Shrestha, P.L.1
Hempel, M.2
Sharif, H.3
Chen, H.H.4
-
139
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
David Chaum (Ed.). Springer US
-
G. J. Simmons. 1984. The prisoners problem and the subliminal channel. In Advances in Cryptology, David Chaum (Ed.). Springer US, 51-67.
-
(1984)
Advances in Cryptology
, pp. 51-67
-
-
Simmons, G.J.1
-
141
-
-
50049089585
-
Detecting IP covert timing channels by correlating packet timing with memory content
-
IEEE
-
R. M. Stillman. 2008. Detecting IP covert timing channels by correlating packet timing with memory content. In IEEE Southeastcon, 2008.IEEE. 204-209.
-
(2008)
IEEE Southeastcon, 2008
, pp. 204-209
-
-
Stillman, R.M.1
-
142
-
-
77954406052
-
A timing attack against the secret permutation in the McEliece PKC
-
Nicolas Sendrier (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
F. Strenzke. 2010. A timing attack against the secret permutation in the McEliece PKC. In Post-Quantum Cryptography, Nicolas Sendrier (Ed.). Lecture Notes in Computer Science, Vol. 6061. Springer, Berlin, 95-107.
-
(2010)
Post-Quantum Cryptography
, vol.6061
, pp. 95-107
-
-
Strenzke, F.1
-
143
-
-
56749169082
-
Side channels in the McEliece PKC
-
Johannes Buchmann and Jintai Ding (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
F. Strenzke, E. Tews, H. G. Molter, R. Overbeck, and A. Shoufan. 2008. Side channels in the McEliece PKC. In Post-Quantum Cryptography, Johannes Buchmann and Jintai Ding (Eds.). Lecture Notes in Computer Science, Vol. 5299. Springer, Berlin, 216-229.
-
(2008)
Post-Quantum Cryptography
, vol.5299
, pp. 216-229
-
-
Strenzke, F.1
Tews, E.2
Molter, H.G.3
Overbeck, R.4
Shoufan, A.5
-
144
-
-
84868142200
-
An identity authentication mechanism based on timing covert channel
-
Y. Sun, X. Guan, T. Liu, and Y. Qu. 2012. An identity authentication mechanism based on timing covert channel. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12). 832-836.
-
(2012)
Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12)
, pp. 832-836
-
-
Sun, Y.1
Guan, X.2
Liu, T.3
Qu, Y.4
-
146
-
-
0033889530
-
Sequential decoding for the exponential server timing channel
-
Mar 2000
-
R. Sundaresan and S. Verdu. 2000b. Sequential decoding for the exponential server timing channel. IEEE Transactions on Information Theory, 46, 2 (Mar 2000), 705-709.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 705-709
-
-
Sundaresan, R.1
Verdu, S.2
-
147
-
-
33745130693
-
Capacity of queues via point-process channels
-
June 2006
-
R. Sundaresan and S. Verdu. 2006. Capacity of queues via point-process channels. IEEE Transactions on Information Theory, 52, 6 (June 2006), 2697-2709.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2697-2709
-
-
Sundaresan, R.1
Verdu, S.2
-
149
-
-
77949631541
-
Gate-level information-flow tracking for secure architectures
-
Jan. 2010
-
M. Tiwari, X. Li, H. M. G. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood. 2010. Gate-level information-flow tracking for secure architectures. IEEE Micro 30, 1 (Jan. 2010), 92-100.
-
(2010)
IEEE Micro
, vol.30
, Issue.1
, pp. 92-100
-
-
Tiwari, M.1
Li, X.2
Wassel, H.M.G.3
Mazloom, B.4
Mysore, S.5
Chong, F.T.6
Sherwood, T.7
-
150
-
-
80052533055
-
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
-
M. Tiwari, J. K. Oberg, X. Li, J. Valamehr, T. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. 2011. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In Proceedings of the 2011 38th Annual International Symposium on Computer Architecture (ISCA'11) 189-199.
-
(2011)
Proceedings of the 2011 38th Annual International Symposium on Computer Architecture (ISCA'11)
, pp. 189-199
-
-
Tiwari, M.1
Oberg, J.K.2
Li, X.3
Valamehr, J.4
Levin, T.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
151
-
-
67650805392
-
Complete information flow tracking from the gates up
-
ACM, New York, NY
-
M. Tiwari, H. M. G. Wassel, B. Mazloom, S. Mysore, F. T. Chong, and T. Sherwood. 2009. Complete information flow tracking from the gates up. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIV). ACM, New York, NY, 109-120.
-
(2009)
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIV)
, pp. 109-120
-
-
Tiwari, M.1
Wassel, H.M.G.2
Mazloom, B.3
Mysore, S.4
Chong, F.T.5
Sherwood, T.6
-
152
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
Jan. 2010
-
E. Tromer, D. A. Osvik, and A. Shamir. 2010. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology 23, 2 (Jan. 2010), 37-71.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
153
-
-
13444280356
-
Zero-rate reliability of the exponential-server timing channel
-
Feb. 2005
-
A. B. Wagner and V. Anantharam. 2005. Zero-rate reliability of the exponential-server timing channel. IEEE Transactions on Information Theory, 51, 2 (Feb. 2005), 447-465.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.2
, pp. 447-465
-
-
Wagner, A.B.1
Anantharam, V.2
-
154
-
-
79953787214
-
Liquid: A detection-resistant covert timing channel based on IPD shaping
-
2011
-
R. J. Walls, K. Kothari, and M. Wright. 2011. Liquid: A detection-resistant covert timing channel based on IPD shaping. Computer Networks 55, 6 (2011), 1217-1228.
-
(2011)
Computer Networks
, vol.55
, Issue.6
, pp. 1217-1228
-
-
Walls, R.J.1
Kothari, K.2
Wright, M.3
-
155
-
-
84937560280
-
Distinguishing exponent digits by observing modular subtractions
-
David Naccache (Ed.). Lecture Notes in Computer Science, Springer, Berlin
-
C. D. Walter and S. Thompson. 2001. Distinguishing exponent digits by observing modular subtractions. In Topics in Cryptology (CT-RSA'01), David Naccache (Ed.). Lecture Notes in Computer Science, Vol. 2020. Springer, Berlin, 192-207.
-
(2001)
Topics in Cryptology (CT-RSA'01)
, vol.2020
, pp. 192-207
-
-
Walter, C.D.1
Thompson, S.2
-
156
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
ACM, New York, NY
-
X. Wang, S. Chen, and S. Jajodia. 2005. Tracking anonymous peer-to-peer VoIP calls on the internet. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). ACM, New York, NY, 81-91.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
158
-
-
74849088224
-
An interval centroid based spread spectrum watermark for tracing multiple network flows
-
X. Wang, J. Luo, and M. Yang. 2009. An interval centroid based spread spectrum watermark for tracing multiple network flows. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2009 (SMC'09). 4000-4006.
-
(2009)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2009 (SMC'09)
, pp. 4000-4006
-
-
Wang, X.1
Luo, J.2
Yang, M.3
-
162
-
-
79952936543
-
Robust correlation of encrypted attack traffic through stepping stones by flow watermarking
-
May 2011
-
X. Wang and D. S. Reeves. 2011. Robust correlation of encrypted attack traffic through stepping stones by flow watermarking. IEEE Transactions on Dependable and Secure Computing, 8, 3 (May 2011), 434-449.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.3
, pp. 434-449
-
-
Wang, X.1
Reeves, D.S.2
-
163
-
-
84887996583
-
A novel sequential watermark detection model for efficient traceback of secret network attack flows
-
2013
-
X. Wang, M. Yang, and J. Luo. 2013. A novel sequential watermark detection model for efficient traceback of secret network attack flows. Journal of Network and Computer Applications 36, 6 (2013), 1660-1670.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.6
, pp. 1660-1670
-
-
Wang, X.1
Yang, M.2
Luo, J.3
-
164
-
-
70349665526
-
Traffic controller: A practical approach to block network covert timing channel
-
Y. Wang, P. Chen, Y. Ge, B. Mao, and L. Xie. 2009. Traffic controller: A practical approach to block network covert timing channel. In Proceedings of the International Conference on Availability, Reliability and Security, 2009 (ARES'09). 349-354.
-
(2009)
Proceedings of the International Conference on Availability, Reliability and Security, 2009 (ARES'09)
, pp. 349-354
-
-
Wang, Y.1
Chen, P.2
Ge, Y.3
Mao, B.4
Xie, L.5
-
166
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
June 2008
-
Y. Wang and P. Moulin. 2008. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, 54, 6 (June 2008), 2706-2722.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
-
171
-
-
84881183208
-
SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip
-
ACM, New York, NY
-
H. M. G. Wassel, Y. Gao, J. K. Oberg, T. Huffmire, R. Kastner, F. T. Chong, and T. Sherwood. 2013. SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip. In Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA'13). ACM, New York, NY, 583-594.
-
(2013)
Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA'13)
, pp. 583-594
-
-
Wassel, H.M.G.1
Gao, Y.2
Oberg, J.K.3
Huffmire, T.4
Kastner, R.5
Chong, F.T.6
Sherwood, T.7
-
173
-
-
82755194868
-
Improving performance of network covert timing channel through Huffman coding
-
2012
-
J. Wu, Y. Wang, L. Ding, and X. Liao. 2012. Improving performance of network covert timing channel through Huffman coding. Mathematical and Computer Modelling 55, 1-2 (2012), 69-79.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 69-79
-
-
Wu, J.1
Wang, Y.2
Ding, L.3
Liao, X.4
-
174
-
-
79551638986
-
Robust first two rounds access driven cache timing attack on AES
-
Z. Xinjie, W. Tao, M. Dong, Z. Yuanyuan, and L. Zhaoyang. 2008. Robust first two rounds access driven cache timing attack on AES. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Vol. 3. 785-788.
-
(2008)
Proceedings of the 2008 International Conference on Computer Science and Software Engineering
, vol.3
, pp. 785-788
-
-
Xinjie, Z.1
Tao, W.2
Dong, M.3
Yuanyuan, Z.4
Zhaoyang, L.5
-
175
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
Nov. 2009
-
L. Yao, X. Zi, L. Pan, and J. Li. 2009. A study of on/off timing channel based on packet delay distribution. Computers & Security 28, 8 (Nov. 2009), 785-794. http://dx.doi.org/10.1016/j.cose.2009.05.006.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
176
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao. 2007. DSSS-based flow marking technique for invisible traceback. In Proceedings of the IEEE Symposium on Security and Privacy, 2007 (SP'07). 18-32.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy, 2007 (SP'07)
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
177
-
-
85017164468
-
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency
-
ACM, New York, NY
-
M. Yue, W. H. Robinson, L. Watkins, and C. Corbett. 2014. Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. In Proceedings of the 3rd Workshop on Hardware and Architectural Support for Security and Privacy (HASP'14). ACM, New York, NY, Article 2, 8 pages.
-
(2014)
Proceedings of the 3rd Workshop on Hardware and Architectural Support for Security and Privacy (HASP'14)
-
-
Yue, M.1
Robinson, W.H.2
Watkins, L.3
Corbett, C.4
-
178
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
2007
-
S. Zander, G. Armitage, and P. Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007), 44-57.
-
(2007)
IEEE Communications Surveys & Tutorials
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
179
-
-
79956019344
-
Stealthier inter-packet timing covert channels
-
Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, and Caterina Scoglio (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
S. Zander, G. Armitage, and P. Branch. 2011. Stealthier inter-packet timing covert channels. In NETWORKING 2011, Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, and Caterina Scoglio (Eds.). Lecture Notes in Computer Science, Vol. 6640. Springer, Berlin, 458-470.
-
(2011)
NETWORKING 2011
, vol.6640
, pp. 458-470
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
180
-
-
72849130791
-
An improved DSSS-based flow marking technique for anonymous communication traceback
-
L. Zhang, J. Luo, and M. Yang. 2009. An improved DSSS-based flow marking technique for anonymous communication traceback. In Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009 (UIC-ATC'09). 563-567.
-
(2009)
Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009 (UIC-ATC'09)
, pp. 563-567
-
-
Zhang, L.1
Luo, J.2
Yang, M.3
-
184
-
-
79960353815
-
Evaluating the transmission rate of covert timing channels in a network
-
2011
-
X. Zi, L. Yao, X. Jiang, L. Pan, and J. Li. 2011. Evaluating the transmission rate of covert timing channels in a network. Computer Networks 55, 12 (2011), 2760-2771.
-
(2011)
Computer Networks
, vol.55
, Issue.12
, pp. 2760-2771
-
-
Zi, X.1
Yao, L.2
Jiang, X.3
Pan, L.4
Li, J.5
-
185
-
-
77955419362
-
Implementing a passive network covert timing channel
-
2010
-
X. Zi, L. Yao, L. Pan, and J. Li. 2010. Implementing a passive network covert timing channel. Computers and Security 29, 6 (2010), 686-696.
-
(2010)
Computers and Security
, vol.29
, Issue.6
, pp. 686-696
-
-
Zi, X.1
Yao, L.2
Pan, L.3
Li, J.4
|