共 38 条
[1]
Aciiçmez O, 2007, CSAW'07: PROCEEDINGS OF THE 2007 ACM COMPUTER SECURITY ARCHITECTURE WORKSHOP, P11
[3]
[Anonymous], 2017, P UK WORKSH COMP INT
[4]
[Anonymous], 2017, IACR Cryptology ePrint Archive
[5]
[Anonymous], 2018, PERFORMANCE APPL PRO
[6]
[Anonymous], 2012, P ACM C COMP COMM SE, DOI DOI 10.1145/2382196.2382230
[7]
Predictive Black-Box Mitigation of Timing Channels
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:297-307
[8]
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[9]
CacheShield: Detecting Cache Attacks through Self-Observation
[J].
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18),
2018,
:224-235