共 74 条
[1]
[Anonymous], 2018, ARXIV180804761
[2]
[Anonymous], 2014, P 3 INT C PRINC SEC
[3]
[Anonymous], 2014, P 20 INT C TOOLS ALG
[4]
[Anonymous], 2017, P 15 ACM IEEE INT C
[5]
Antonopoulos T, 2017, ACM SIGPLAN NOTICES, V52, P362, DOI [10.1145/3062341.3062378, 10.1145/3140587.3062378]
[6]
AREANU P AS., 2010, P IEEEACM INT C AUTO, P179, DOI [10.1145/1858996.1859035, DOI 10.1145/1858996.1859035]
[7]
Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:261-275
[8]
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:307-322
[9]
String Analysis for Side Channels with Segmented Oracles
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:193-204
[10]
Testing Cache Side-channel Leakage
[J].
10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017,
2017,
:51-60