Affiliation:
1. Georgia Institute of Technology, United States of America
2. University of Adelaide, Australia
3. Intel Labs, United States of America
4. Microsoft, USA
5. Intel Labs, Austria
6. Ruhr University Bochum, Germany
Funder
Air Force Office of Scientific Research
CSIRO's Data61
Intel Corporation
Defense Advanced Research Projects Agency
the Blavatnik ICRC at Tel-Aviv University
Deutsche Forschungsgemeinschaft
Phoenix HPC service at the University of Adelaide
Qualcomm
National Science Foundation
Australian Research Council
Reference88 articles.
1. Onur Acıiçmez Çetin Kaya Koç and Jean-Pierre Seifert. 2007. Predicting Secret Keys Via Branch Prediction. In CT-RSA. 225–242. Onur Acıiçmez Çetin Kaya Koç and Jean-Pierre Seifert. 2007. Predicting Secret Keys Via Branch Prediction. In CT-RSA. 225–242.
2. Alejandro Cabrera Aldaya , Cesar Pereida García , Luis Manuel Alvarez Tapia , and Billy Bob Brumley . 2019 . Cache-Timing Attacks on RSA Key Generation. TCHES 2019 , 4 (2019), 213–242. Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, and Billy Bob Brumley. 2019. Cache-Timing Attacks on RSA Key Generation. TCHES 2019, 4 (2019), 213–242.
3. CaSA;Bourgeat Thomas;End-to-end Quantitative Security Analysis of Randomly Mapped Caches. In MICRO,2020
4. Ferdinand Brasser Urs Müller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT. Ferdinand Brasser Urs Müller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In WOOT.
5. Billy Bob Brumley. 2015. Cache Storage Attacks. In CT-RSA. 22–34. Billy Bob Brumley. 2015. Cache Storage Attacks. In CT-RSA. 22–34.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献