共 74 条
[31]
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:490-505
[32]
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
[J].
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2018,
:377-388
[33]
Assertion Guided Symbolic Execution of Multithreaded Programs
[J].
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS,
2015,
:854-865
[34]
Practical Timing Side Channel Attacks Against Kernel Space ASLR
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:191-205
[36]
Spectre Attacks: Exploiting Speculative Execution
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1-19
[37]
Lattner C, 2004, INT SYM CODE GENER, P75, DOI 10.1109/CGO.2004.1281665
[38]
Li T, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK: 2005 UNENIX ANNUAL TECHNICAL CONFERENCE, P31
[40]
Accurate timing analysis by modeling caches, speculation and their interaction.
[J].
40TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2003,
2003,
:466-471