共 50 条
[41]
Side-Channel Analysis of Montgomery's Representation Randomization
[J].
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014,
2014, 8781
:212-227
[42]
SoK: Neural Network Extraction Through Physical Side Channels
[J].
PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024,
2024,
:3403-3422
[43]
A Systematic Study of Cache Side Channels Across AES Implementations
[J].
ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2017,
2017, 10379
:213-230
[44]
Eavesdropping User Credentials via GPU Side Channels on Smartphones
[J].
ASPLOS '22: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS,
2022,
:285-299
[45]
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1337-1350
[46]
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
[J].
PROCEEDINGS OF THE 14TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2021,
2021,
:169-180
[47]
Exploiting multiple side channels for secret key agreement in Wireless Networks
[J].
ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING,
2018,
[49]
MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata
[J].
2024 ACM/IEEE 51ST ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, ISCA 2024,
2024,
:693-707
[50]
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:853-869