共 14 条
- [1] [Anonymous], 2011, P USENIX SEC S
- [2] Atya A.O.F., 2017, IEEE Conference on Computer Communications, INFOCOM'17, P1
- [3] Foster I., 2015, P USENIX WORKSH OFF
- [4] Garip M. T., 2015, P NDSS
- [5] Georgiev Martin, 2012, Proceedings of the 2012 ACM conference on Computer and communications security - CCS'12, page, P38, DOI 10.1145/2382196.2382204
- [7] Practical Timing Side Channel Attacks Against Kernel Space ASLR [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 191 - 205
- [8] A High-Resolution Side-Channel Attack on Last-Level Cache [J]. 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
- [9] Man in the Cloud (MITC) Defender: SGX-based User Credential Protection for Synchronization applications in Cloud Computing Platform [J]. 2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 302 - 309
- [10] Miller C., 2015, REMOTE EXPLOITATION