共 17 条
[1]
CacheShield: Detecting Cache Attacks through Self-Observation
[J].
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18),
2018,
:224-235
[3]
Das S., 2019, 2019 IEEE S SEC PRIV
[4]
FEI Y., 2018, PROC IEEEACM ICCAD, P1
[5]
Gruss Daniel, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P279, DOI 10.1007/978-3-319-40667-1_14
[6]
Gruss D, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P217
[7]
Kim T., 2012, 2012 IEEE Power & Energy Society General Meeting. New Energy Horizons - Opportunities and Challenges, DOI 10.1109/PESGM.2012.6345454
[8]
Kocher P, 2018, Spectre Attacks: Exploiting Speculative Execution
[9]
Lipp M., 2018, ABS180101207 CORR
[10]
Liu F, 2016, INT S HIGH PERF COMP, P406, DOI 10.1109/HPCA.2016.7446082