共 21 条
- [1] Apecechea G., 2015, ASIACCS 15 10 ACM S, P85, DOI [10.1145/2714576.2714625, DOI 10.1145/2714576.2714625]
- [2] The PARSEC Benchmark Suite: Characterization and Architectural Implications [J]. PACT'08: PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, 2008, : 72 - 81
- [3] Briongos S, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1967
- [4] Disselkoen C, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P51
- [5] Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1132 - 1140
- [6] Gruss Daniel, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P279, DOI 10.1007/978-3-319-40667-1_14
- [7] Guo YA, 2022, P IEEE S SECUR PRIV, P1458, DOI [10.1109/SP46214.2022.9833692, 10.1109/SP46214.2022.00121]
- [8] S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing-and its Application to AES [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 591 - 604
- [9] Kayaalp M, 2017, DES AUT CON, DOI 10.475/123_4
- [10] Last-Level Cache Side-Channel Attacks are Practical [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 605 - 622