共 21 条
[1]
[Anonymous], 1983, TRUST COMP SYST EV C
[2]
[Anonymous], 2009, WAVELET TOUR SIGNAL
[3]
[Anonymous], 2012, SECURITY 12
[4]
CC-Hunter: Uncovering Covert Timing Channels on Shared Processor Hardware
[J].
2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO),
2014,
:216-228
[5]
Hardware identification of cache conflict misses
[J].
32ND ANNUAL INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, (MICRO-32), PROCEEDINGS,
1999,
:126-135
[6]
Demme J, 2012, CONF PROC INT SYMP C, P106, DOI 10.1109/ISCA.2012.6237010
[8]
Ferraiuolo A., 2016, P INT S HIG IN PRESS
[9]
Gray J. W. III, 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.93CH3290-4), P90, DOI 10.1109/RISP.1993.287640
[10]
Hu W.-M., 1992, J COMPUTER SECURITY