-
3
-
-
85076294701
-
-
PolarSSL. http://polarssl.org/.
-
-
-
-
4
-
-
84903309805
-
-
Sorting algorithms. http://www.codebeach.com/2008/09/sorting-algorithms-in-c.html.
-
Sorting Algorithms
-
-
-
5
-
-
79960321311
-
Trace-driven cache attacks on AES
-
Springer
-
O. Aciiçmez and Ç. K. Koç. Trace-driven cache attacks on AES. In ICICS, pages 112-121. Springer, 2006.
-
(2006)
ICICS
, pp. 112-121
-
-
Aciiçmez, O.1
Koç, C.K.2
-
6
-
-
85022027006
-
Cache based remote timing attack on the AES
-
Springer
-
O. Aciiçmez, W. Schindler, and Ç. K. Koç. Cache based remote timing attack on the AES. In CT-RSA, pages 271-286. Springer, 2007.
-
(2007)
CT-RSA
, pp. 271-286
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, C.K.3
-
7
-
-
0033702592
-
Transforming out timing leaks
-
J. Agat. Transforming out timing leaks. In POPL 2000, pages 40-53. ACM, 2000.
-
(2000)
POPL 2000
, pp. 40-53
-
-
Agat, J.1
-
8
-
-
0034823291
-
On confidentiality and algorithms
-
J. Agat and D. Sands. On confidentiality and algorithms. In SSP, pages 64-77. IEEE, 2001.
-
(2001)
SSP
, pp. 64-77
-
-
Agat, J.1
Sands, D.2
-
9
-
-
70449625216
-
Automatic discovery and quantification of information leaks
-
M. Backes, B. Köpf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In SSP, pages 141-153. IEEE, 2009.
-
(2009)
SSP
, pp. 141-153
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
-
12
-
-
84944083010
-
Efficient chaotic iteration strategies with widenings
-
Springer
-
F. Bourdoncle. Efficient chaotic iteration strategies with widenings. In FMPA, pages 128-141. Springer, 1993.
-
(1993)
FMPA
, pp. 128-141
-
-
Bourdoncle, F.1
-
13
-
-
34247267232
-
Modular development of certified program verifiers with a proof assistant
-
A. Chlipala. Modular development of certified program verifiers with a proof assistant. In ICFP, pages 160-171. ACM, 2006.
-
(2006)
ICFP
, pp. 160-171
-
-
Chlipala, A.1
-
14
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. JCS, 15(3):321-371, 2007.
-
(2007)
JCS
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
15
-
-
70449623154
-
Practical mitigations for timing-based side-channel attacks on modern x86 processors
-
B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter. Practical mitigations for timing-based side-channel attacks on modern x86 processors. In SSP, pages 45-60. IEEE, 2009.
-
(2009)
SSP
, pp. 45-60
-
-
Coppens, B.1
Verbauwhede, I.2
Bosschere, K.D.3
Sutter, B.D.4
-
16
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction of approximation of fixpoints. In POPL, pages 238-252, 1977.
-
(1977)
POPL
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
17
-
-
0018294932
-
Systematic design of program analysis frameworks
-
P. Cousot and R. Cousot. Systematic design of program analysis frameworks. In POPL, pages 269-282, 1979.
-
(1979)
POPL
, pp. 269-282
-
-
Cousot, P.1
Cousot, R.2
-
18
-
-
84872480610
-
Theories, solvers and static analysis by abstract interpretation
-
P. Cousot, R. Cousot, and L. Mauborgne. Theories, solvers and static analysis by abstract interpretation. Journal of the ACM, 59(6):31, 2012.
-
(2012)
Journal of the ACM
, vol.59
, Issue.6
, pp. 31
-
-
Cousot, P.1
Cousot, R.2
Mauborgne, L.3
-
20
-
-
57949107348
-
Leakage-resilient cryptography
-
S. Dziembowski and K. Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302. IEEE, 2008.
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
21
-
-
0033224746
-
Cache behavior prediction by abstract interpretation
-
C. Ferdinand, F. Martin, R. Wilhelm, and M. Alt. Cache behavior prediction by abstract interpretation. Science of Computer Programming, 35(2):163-189, 1999.
-
(1999)
Science of Computer Programming
, vol.35
, Issue.2
, pp. 163-189
-
-
Ferdinand, C.1
Martin, F.2
Wilhelm, R.3
Alt, M.4
-
23
-
-
80051974249
-
Cache games - Bringing access-based cache attacks on AES to practice
-
D. Gullasch, E. Bangerter, and S. Krenn. Cache games - bringing access-based cache attacks on AES to practice. In SSP, pages 490-505. IEEE, 2011.
-
(2011)
SSP
, pp. 490-505
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
24
-
-
6944231166
-
The influence of processor architecture on the design and the results of WCET tools
-
R. Heckmann, M. Langenbach, S. Thesing, and R. Wilhelm. The influence of processor architecture on the design and the results of WCET tools. IEEE Proceedings on Real-Time Systems, 91(7):1038-1054, 2003.
-
(2003)
IEEE Proceedings on Real-Time Systems
, vol.91
, Issue.7
, pp. 1038-1054
-
-
Heckmann, R.1
Langenbach, M.2
Thesing, S.3
Wilhelm, R.4
-
25
-
-
28044445125
-
Timing aware information flow security for a JavaCard-like bytecode
-
D. Hedin and D. Sands. Timing aware information flow security for a JavaCard-like bytecode. ENTCS, 141(1):163-182, 2005.
-
(2005)
ENTCS
, vol.141
, Issue.1
, pp. 163-182
-
-
Hedin, D.1
Sands, D.2
-
26
-
-
78751504408
-
Quantifying information leaks in software
-
J. Heusser and P. Malacaria. Quantifying information leaks in software. In ACSAC, pages 261-269. ACM, 2010.
-
(2010)
ACSAC
, pp. 261-269
-
-
Heusser, J.1
Malacaria, P.2
-
27
-
-
84878345548
-
Memento: Learning secrets from process footprints
-
S. Jana and V. Shmatikov. Memento: Learning secrets from process footprints. In SSP, pages 143-157. IEEE, 2012.
-
(2012)
SSP
, pp. 143-157
-
-
Jana, S.1
Shmatikov, V.2
-
28
-
-
70350594114
-
Faster and timing-attack resistant AES-GCM
-
E. Käsper and P. Schwabe. Faster and timing-attack resistant AES-GCM. In CHES, pages 1-17, 2009.
-
(2009)
CHES
, pp. 1-17
-
-
Käsper, E.1
Schwabe, P.2
-
29
-
-
85073538603
-
Stealth-mem: System-level protection against cache-based side channel attacks in the cloud
-
T. Kim, M. Peinado, and G. Mainar-Ruiz. Stealth-Mem: System-level protection against cache-based side channel attacks in the cloud. In 19th USENIX Security Symposium. USENIX, 2012.
-
(2012)
19th USENIX Security Symposium
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
30
-
-
58449105414
-
An abstract interpretation-based framework for control flow reconstruction from binaries
-
Springer
-
J. Kinder, F. Zuleger, and H. Veith. An abstract interpretation-based framework for control flow reconstruction from binaries. In VMCAI, pages 214-228. Springer, 2009.
-
(2009)
VMCAI
, pp. 214-228
-
-
Kinder, J.1
Zuleger, F.2
Veith, H.3
-
31
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In CRYPTO, pages 104-113. Springer, 1996.
-
(1996)
CRYPTO
, pp. 104-113
-
-
Kocher, P.1
-
32
-
-
84939573910
-
Differential power analysis
-
Springer
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388-397. Springer, 1999.
-
(1999)
CRYPTO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
33
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
B. Köpf and D. Basin. An Information-Theoretic Model for Adaptive Side-Channel Attacks. In CCS, pages 286-296. ACM, 2007.
-
(2007)
CCS
, pp. 286-296
-
-
Köpf, B.1
Basin, D.2
-
34
-
-
84864059907
-
Automatic quantification of cache side-channels
-
Springer
-
B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. In CAV, pages 564-580. Springer, 2012.
-
(2012)
CAV
, pp. 564-580
-
-
Köpf, B.1
Mauborgne, L.2
Ochoa, M.3
-
35
-
-
77957604761
-
Approximation and randomization for quantitative information-flow analysis
-
B. Köpf and A. Rybalchenko. Approximation and randomization for quantitative information-flow analysis. In CSF, pages 3-14. IEEE, 2010.
-
(2010)
CSF
, pp. 3-14
-
-
Köpf, B.1
Rybalchenko, A.2
-
36
-
-
24644456617
-
Trace partitioning in abstract interpretation based static analyzers
-
Springer
-
L. Mauborgne and X. Rival. Trace partitioning in abstract interpretation based static analyzers. In ESOP, Volume 3444 of LNCS, pages 5-20. Springer, 2005.
-
(2005)
ESOP, Volume 3444 of LNCS
, pp. 5-20
-
-
Mauborgne, L.1
Rival, X.2
-
37
-
-
84860315491
-
Calculating bounds on information leakage using two-bit patterns
-
Z. Meng and G. Smith. Calculating bounds on information leakage using two-bit patterns. In PLAS. ACM, 2011.
-
(2011)
PLAS. ACM
-
-
Meng, Z.1
Smith, G.2
-
38
-
-
70450252184
-
Measuring channel capacity to distinguish undue influence
-
J. Newsome, S. McCamant, and D. Song. Measuring channel capacity to distinguish undue influence. In PLAS, pages 73-85. ACM, 2009.
-
(2009)
PLAS
, pp. 73-85
-
-
Newsome, J.1
McCamant, S.2
Song, D.3
-
39
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
Springer
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of AES. In C T-RSA, Volume 3860 of LNCS, pages 1-20. Springer, 2006.
-
(2006)
C T-RSA, Volume 3860 of LNCS
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
40
-
-
34047117968
-
Cache missing for fun and profit
-
C. Percival. Cache missing for fun and profit. In BSDCan, 2005.
-
(2005)
BSDCan
-
-
Percival, C.1
-
41
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199-212. ACM, 2009.
-
(2009)
CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
43
-
-
68549087948
-
On the foundations of quantitative information flow
-
Springer
-
G. Smith. On the foundations of quantitative information flow. In FoSSaCS, pages 288-302. Springer, 2009.
-
(2009)
FoSSaCS
, pp. 288-302
-
-
Smith, G.1
-
44
-
-
38149099434
-
An analytical model for time-driven cache attacks
-
Springer
-
K. Tiri, O. Aciiçmez, M. Neve, and F. Andersen. An analytical model for time-driven cache attacks. In FSE, Volume 4593 of LNCS, pages 399-413. Springer, 2007.
-
(2007)
FSE, Volume 4593 of LNCS
, pp. 399-413
-
-
Tiri, K.1
Aciiçmez, O.2
Neve, M.3
Andersen, F.4
-
45
-
-
80052533055
-
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
-
M. Tiwari, J. Oberg, X. Li, J. Valamehr, T. E. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In ISCA, pages 189-200. ACM, 2011.
-
(2011)
ISCA
, pp. 189-200
-
-
Tiwari, M.1
Oberg, J.2
Li, X.3
Valamehr, J.4
Levin, T.E.5
Hardekopf, B.6
Kastner, R.7
Chong, F.T.8
Sherwood, T.9
-
46
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In ISCA, pages 494-505. ACM, 2007.
-
(2007)
ISCA
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
47
-
-
78650013814
-
Practical leakage-resilient pseudorandom generators
-
Y. Yu, F.-X. Standaert, O. Pereira, and M. Yung. Practical leakage-resilient pseudorandom generators. In CCS, pages 141-151. ACM, 2010.
-
(2010)
CCS
, pp. 141-151
-
-
Yu, Y.1
Standaert, F.-X.2
Pereira, O.3
Yung, M.4
-
48
-
-
84863432828
-
Language-based control and mitigation of timing channels
-
D. Zhang, A. Askarov, and A. C. Myers. Language-based control and mitigation of timing channels. In PLDI, pages 99-110. ACM, 2012.
-
(2012)
PLDI
, pp. 99-110
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
|