Author:
Zhang Tianwei,Zhang Yinqian,Lee Ruby B.
Publisher
Springer International Publishing
Reference48 articles.
1. Azar, Y., Kamara, S., Menache, I., Raykova, M., Shepard, B.: Co-location-resistant clouds. In: ACM Workshop on Cloud Computing Security (2014)
2. Bahador, M., Abadi, M., Tajoddin, A.: HPCMalHunter: behavioral malware detection using hardware performance counters and singular value decomposition. In: IEEE International Conference on Computer and Knowledge Engineering (2014)
3. Barr, J.: Cloud computing, server utilization & the environment (2015). https://aws.amazon.com/blogs/aws/cloud-computing-server-utilization-the-environment/
4. Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Cryptology ePrint Archive, Report 2015/1034 (2015). http://eprint.iacr.org/
5. Demme, J., Maycock, M., Schmitz, J., Tang, A., Waksman, A., Sethumadhavan, S., Stolfo, S.: On the feasibility of online malware detection with performance counters. In: ACM International Symposium on Computer Architecture (2013)
Cited by
152 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CarePlus: A general framework for hardware performance counter based malware detection under system resource competition;Computers & Security;2024-08
2. Mayhem: Targeted Corruption of Register and Stack Variables;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
4. NVM-Flip: Non-Volatile-Memory BitFlips on the System Level;Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems;2024-06-19
5. Efficient Detection and Mitigation Schemes for Speculative Side Channels;2024 IEEE International Symposium on Circuits and Systems (ISCAS);2024-05-19