1. Reading kernel memory from user space;Lipp,2018
2. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems;Paul,1996
3. Spectre Attacks: Exploiting Speculative Execution;Paul,2019
4. Dude, is my code constant time?;Reparaz,2017
5. Quantitative analysis of timing channel security in cryptographic hardware design;Mao;IEEE Trans. Comput. Aided Des. Integrated Circ. Syst.,2018