共 40 条
- [1] Aciicmez O., Yet another microarchitectural attack: Exploiting I-Cache, Proceedings of the ACM Workshop on Computer Security Architecture, Fairfax, pp. 11-18, (2007)
- [2] Aciicmez O., Brumley B.B., Grabher P., New results on instruction cache attacks, Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, pp. 110-124, (2010)
- [3] Aciicmez O., Gueron S., Seifert J.-P., New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures, Cryptography and Coding 2007.LNCS, vol. 4887, pp. 185-203, (2007)
- [4] Aciicmez O., Koc C.K., Seifert J.-P., On the power of simple branch prediction analysis, Proceedings of the Second ACMSymposium on Information, Computer and Communication Security, Singapore, pp. 312–320, (2007)
- [5] Aciicmez O., Schindler W., A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL, CT-RSA2008.LNCS, vol. 4964, pp. 256-273, (2008)
- [6] Arcangeli A., Eidus, I.,Wright, C.: Increasing memory density by using KSM, Proceedings of the Linux Symposium, Montreal, Quebec, Canada, pp. 19–28, (2009)
- [7] Bernstein D.J., Cache-timing attacks on AES
- [8] Bernstein D.J., Lange T., Schwabe P., The security impact of a new cryptographic library, LatinCrypt 2012.LNCS, vol. 7533, pp. 159-176, (2012)
- [9] Bos J.W., Halderman J.A., Heninger N., Moore J., Naehrig M., Wustrow E., Elliptic curve cryptography in practice. Cryptology ePrint Archive, Report 2013/734, (2013)
- [10] Brumley B.B., Hakala R.M., Cache-timing template attacks, ASIACRYPT 2009.LNCS, vol. 5912, pp. 667-684, (2009)