Author:
Yan Mengjia,Shalabi Yasser,Torrellas Josep
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On The Effect of Replacement Policies on The Security of Randomized Cache Architectures;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. FitBit: Ensuring Robust and Secure Execution Through Runtime-Generated Stressmarks;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
3. RSPP: Restricted Static Pseudo-Partitioning for Mitigation of Cross-Core Covert Channel Attacks;ACM Transactions on Design Automation of Electronic Systems;2024-01-15
4. Covert Channel Detection and Generation Techniques: A Survey;2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA);2023-10-10
5. Information Leakage Attacks Exploiting Cache Replacement in Commercial Processors;IEEE Transactions on Computers;2023-09-01