Author:
Clark Shane S.,Mustafa Hossen,Ransford Benjamin,Sorber Jacob,Fu Kevin,Xu Wenyuan
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. iMacros for Firefox (loaded September 2011),
http://www.iopus.com/imacros/firefox/
2. Alexa Internet, Inc. Top 1,000,000 sites (updated daily) (loaded February 12, 2012),
http://s3.amazonaws.com/alexa-static/top-1m.csv.zip
3. Barisani, A., Bianco, D.: Sniffing keystrokes with lasers/voltmeters. CanSecWest (March 2009), Presentation slides
4. Becker, G.T., Strobel, D., Paar, C., Burleson, W.: Detecting software theft in embedded systems: A side-channel approach. IEEE Transactions on Information Forensics and Security 7(4) (August 2012)
5. Chang, C.-C., Lin, C.-J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2 (2011)
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
2. Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices;IEEE Transactions on Consumer Electronics;2024
3. Independent Boot Process Verification using Side-Channel Power Analysis;2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C);2023-10-22
4. ThermWare;Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications;2023-02-22
5. Interface-Based Side Channel in TEE-Assisted Networked Services;IEEE/ACM Transactions on Networking;2023