-
1
-
-
34248682000
-
Data encryption Standard (DES)
-
Federal Information Processing Standards Publication
-
Data Encryption Standard (DES). In FIPS PUB 46, Federal Information Processing Standards Publication (1977).
-
(1977)
FIPS PUB
, vol.46
-
-
-
2
-
-
85076215631
-
Advanced encryption standard (AES
-
Federal Information Processing Standards Publication
-
Advanced Encryption Standard (AES). In FIPS PUB 197, Federal Information Processing Standards Publication (2001).
-
(2001)
FIPS PUB 197
-
-
-
4
-
-
85022027006
-
Cache based remote timing attack on the AES
-
Springer-Verlag
-
ACIIÇMEZ, O., SCHINDLER, W., AND ÇETIN K. KOÇ. Cache based remote timing attack on the AES. In Topics in Cryptology – CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007 (2007), Springer-Verlag, pp. 271–286.
-
(2007)
Topics in Cryptology – CT-RSA 2007, the Cryptographers’ Track at the RSA Conference 2007
, pp. 271-286
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
7
-
-
78650158728
-
Determinating timing channels in compute clouds
-
AVIRAM, A., HU, S., FORD, B., AND GUMMADI, R. Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM Cloud Computing Security Workshop (2010), pp. 103–108.
-
(2010)
Proceedings of the 2010 ACM Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
10
-
-
38549138136
-
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
-
Report 2006/052
-
BRICKELL, E., GRAUNKE, G., NEVE, M., AND SEIFERT, J.P. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR ePrint Archive, Report 2006/052, 2006.
-
(2006)
IACR ePrint Archive
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.P.4
-
11
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern x86 processors
-
COPPENS, B., VERBAUWHEDE, I., BOSSCHERE, K. D., AND SUTTER, B. D. Practical mitigations for timing-based side-channel attacks on modern x86 processors. In Proceedings of the 2009 IEEE Symposium on Security and Privacy (2009), pp. 45–60.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Security and Privacy
, pp. 45-60
-
-
Coppens, B.1
Verbauwhede, I.2
Bosschere, K.D.3
Sutter, B.D.4
-
12
-
-
84857815168
-
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks
-
Jan
-
DOMNITSER, L., JALEEL, A., LOEW, J., ABU-GHAZALEH, N., AND PONOMAREV, D. Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks. ACM Transactions on Architecture and Code Optimization 8, 4 (Jan. 2012), 35:1–35:21.
-
(2012)
ACM Transactions on Architecture and Code Optimization
, vol.8
, Issue.4
, pp. 351-352
-
-
Domnitser, L.1
Jaleel, A.2
Loew, J.3
Abu-Ghazaleh, N.4
Ponomarev, D.5
-
13
-
-
84910616538
-
Operating system protection against side-channel attacks that exploit memory latency
-
Microsoft Research, August
-
ERLINGSSON, Ú., AND ABADI, M. Operating system protection against side-channel attacks that exploit memory latency. Tech. Rep. MSR-TR-2007-117, Microsoft Research, August 2007.
-
(2007)
Tech. Rep. MSR-TR-2007-117
-
-
Erlingsson, Ú.1
Abadi, M.2
-
14
-
-
80051974249
-
Cache Games – Bringing access-based cache attacks on AES to practice
-
May
-
GULLASCH, D., BANGERTER, E., AND KRENN, S. Cache Games – bringing access-based cache attacks on AES to practice. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (May 2011), pp. 490 –505.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy
, pp. 490-505
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
18
-
-
84889706242
-
Home is safer than the cloud! Privacy concerns for consumer cloud storage
-
ION, I., SACHDEVA, N., KUMARAGURU, P., AND ČAPKUN, S. Home is safer than the cloud! Privacy concerns for consumer cloud storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security (2011), pp. 13:1–13:20.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security
, pp. 131-132
-
-
Ion, I.1
Sachdeva, N.2
Kumaraguru, P.3
Čapkun, S.4
-
19
-
-
78149335852
-
Memory characterization of workloads using instrumentation-driven simulation – A pin-based memory characterization of the SPEC CPU2000 and SPEC CPU2006 benchmark suites
-
JALEEL, A. Memory characterization of workloads using instrumentation-driven simulation – a pin-based memory characterization of the SPEC CPU2000 and SPEC CPU2006 benchmark suites. Tech. rep., VSSAD, 2007.
-
(2007)
Tech. Rep
-
-
Jaleel, A.1
-
21
-
-
10444238444
-
Fair cache sharing and partitioning in a chip multiprocessor architecture
-
KIM, S., CHANDRA, D., AND SOLIHIN, Y. Fair cache sharing and partitioning in a chip multiprocessor architecture. In Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques (2004), pp. 111–122.
-
(2004)
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques
, pp. 111-122
-
-
Kim, S.1
Chandra, D.2
Solihin, Y.3
-
22
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
KOCHER, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology (1996), pp. 104–113.
-
(1996)
Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.C.1
-
23
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
KONG, J., ACIIÇMEZ, O., SEIFERT, J.-P., AND ZHOU, H. Deconstructing new cache designs for thwarting software cache-based side channel attacks. In Proceedings of the 2nd ACM Workshop on Computer Security Architectures (2008), pp. 25–34.
-
(2008)
Proceedings of the 2nd ACM Workshop on Computer Security Architectures
, pp. 25-34
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
24
-
-
64949105813
-
Hardware-software integrated approaches to defend against software cache-based side channel attacks
-
KONG, J., ACIIÇMEZ, O., SEIFERT, J.-P., AND ZHOU, H. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In Proceedings of the 15th International Conference on High Performance Computer Architecture (2009), pp. 393–404.
-
(2009)
Proceedings of the 15th International Conference on High Performance Computer Architecture
, pp. 393-404
-
-
Kong, J.1
Aciiçmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
28
-
-
77952381651
-
AESSE: A cold-boot resistant implementation of AES
-
MÜLLER, T., DEWALD, A., AND FREILING, F. C. AESSE: a cold-boot resistant implementation of AES. In Proceedings of the Third European Workshop on System Security (2010), pp. 42–47.
-
(2010)
Proceedings of the Third European Workshop on System Security
, pp. 42-47
-
-
Müller, T.1
Dewald, A.2
Freiling, F.C.3
-
29
-
-
38349015017
-
Advances on access-driven cache attacks on AES
-
NEVE, M., AND SEIFERT, J.-P. Advances on access-driven cache attacks on AES. In Selected Areas in Cryptography, vol. 4356. 2007, pp. 147–162.
-
(2007)
Selected Areas in Cryptography
, vol.4356
, pp. 147-162
-
-
Neve, M.1
Seifert, J.-P.2
-
30
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
OSVIK, D. A., SHAMIR, A., AND TROMER, E. Cache attacks and countermeasures: the case of AES. In Topics in Cryptology - CT-RSA 2006, The Cryptographers Track at the RSA Conference 2006 (2005), pp. 1–20.
-
(2005)
Topics in Cryptology - CT-RSA 2006, the Cryptographers Track at the RSA Conference 2006
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
32
-
-
34047117968
-
Cache missing for fun and profit
-
Ottawa
-
PERCIVAL, C. Cache missing for fun and profit. In BSDCan 2005 (Ottawa, 2005).
-
(2005)
BSDCan 2005
-
-
Percival, C.1
-
33
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
RAJ, H., NATHUJI, R., SINGH, A., AND ENGLAND, P. Resource management for isolation enhanced cloud services. In Proceedings of the 2009 ACM Cloud Computing Security Workshop (2009), pp. 77–84.
-
(2009)
Proceedings of the 2009 ACM Cloud Computing Security Workshop
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
34
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), pp. 199–212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
38
-
-
79957840719
-
Memory deduplication as a threat to the guest OS
-
SUZAKI, K., IIJIMA, K., YAGI, T., AND ARTHO, C. Memory deduplication as a threat to the guest OS. In Proceedings of the Fourth European Workshop on System Security (EUROSEC’11) (2011), pp. 1:1–1:6.
-
(2011)
Proceedings of the Fourth European Workshop on System Security (EUROSEC’11)
, pp. 111-116
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
39
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
TROMER, E., OSVIK, D. A., AND SHAMIR, A. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology 23, 2 (2010), 37–71.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
40
-
-
35248855964
-
Cryptanalysis of DES implemented on computers with cache
-
TSUNOO, Y., SAITO, T., SUZAKI, T., AND SHIGERI, M. Cryptanalysis of DES implemented on computers with cache. In Proceedings of the 2003 Cryptographic Hardware and Embedded Systems (2003), pp. 62–76.
-
(2003)
Proceedings of the 2003 Cryptographic Hardware and Embedded Systems
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
-
44
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
XU, Y., BAILEY, M., JAHANIAN, F., JOSHI, K., HILTUNEN, M., AND SCHLICHTING, R. An exploration of L2 cache covert channels in virtualized environments. In Proceedings of the 2011 ACM Cloud Computing Security Workshop (2011), pp. 29–40.
-
(2011)
Proceedings of the 2011 ACM Cloud Computing Security Workshop
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
45
-
-
80052008862
-
Home-alone: Co-residency detection in the cloud via side-channel analysis
-
ZHANG, Y., JUELS, A., OPREA, A., AND REITER, M. K. Home-Alone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (2011), pp. 313–328.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|