共 37 条
[12]
Gruss D, 2016, LECT NOTES COMPUT SC, V9721, P279, DOI 10.1007/978-3-319-40667-1_14
[13]
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:490-505
[14]
Gulmezoglu B., 2019, ARXIV PREPRINT ARXIV
[15]
Hand S., 2011, P 4 EUR WORKSH SYST
[16]
Hat R, 2 2 VIRTUAL PERFORMA
[17]
Hornby T., 2016, SIDE CHANNEL ATTACKS
[18]
Hussain Syed Asad, 2017, Applied Computing and Informatics, V13, P57, DOI 10.1016/j.aci.2016.03.001
[19]
Irazoqui Gorka, 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P299, DOI 10.1007/978-3-319-11379-1_15
[20]
Fine Grain Cross-VM Attacks on Xen and VMware
[J].
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD),
2014,
:737-744