Author:
Tong Zhongkai,Zhu Ziyuan,Sha Zhangyu,Liu Yuxin,Meng Dan
Publisher
Springer Nature Singapore
Reference17 articles.
1. Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) Topics in Cryptology – CT-RSA 2006, pp. 1–20. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https://doi.org/10.1007/11605805_1
2. Inci, M.S., G¨ulmezoglu, B., Apecechea, G.I., et al.: Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch. 2015, 898 (2015)
3. Gulmezoglu, B., Eisenbarth, T., Sunar, B.: Cache-based application detection in the cloud using machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 288–300 (2017)
4. Mushtaq, M., Akram, A., Bhatti, M.K., et al.: Nights-watch: a cache-based sidechannel intrusion detector using hardware performance counters. In: Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, pp. 1–8 (2018)
5. Bazm, M.M., Sautereau, T., Lacoste, M., et al.: Cache-based side-channel attacks detection through intel cache monitoring technology and hardware performance counters. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 7–12. IEEE (2018)