Funder
Higher Education Commision, Pakistan
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference41 articles.
1. Performance application programming interface. In: http://icl.cs.utk.edu/papi/http://icl.cs.utk.edu/papi/ (2018)
2. Aciiçmez O (2007) Yet another microarchitectural attack: exploiting I-cache. In: Proceedings of the 2007 ACM workshop on computer security architecture, CSAW ’07. ACM, New York, pp 11–18. https://doi.org/10.1145/1314466.1314469
3. Akram A, Mushtaq M, Bhatti M, Lapotre V, Gogniat G (2020) Meet the Sherlock Holmes’ of side channel leakage: a survey of cache sca detection techniques. IEEE Access 8:70,836–70,860
4. Alam M, Bhattacharya S, Mukhopadhyay D, Bhattacharya S (2017) Performance counters to rescue: a machine learning based safeguard against micro-architectural side-channel-attacks. Cryptology ePrint Archive Report 2017/564
5. Allaf Z, Adda M, Gegov A (2017) A comparison study on flush+reload and prime+probe attacks on aes using machine learning approachess. UK Workshop on Computational Intelligence pp 203—-213
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献