Side-channel attacks

Results: 102



#Item
21JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

Add to Reading List

Source URL: mlq.me

- Date: 2018-03-02 04:05:47
    22Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

    Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

    Add to Reading List

    Source URL: cs.tau.ac.il

    Language: English - Date: 2009-06-25 15:56:23
    23Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

    Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    24Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine  Physical attacks

    Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

    Add to Reading List

    Source URL: esec-lab.sogeti.com

    Language: English - Date: 2016-07-01 12:08:46
    25Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

    Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2015-03-03 02:38:59
    26Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    271  A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

    1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2013-12-23 08:24:26
    28DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose  Hector Pettenghi, Leonel Sousa

    DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2013-03-08 09:35:27
    29Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

    Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    30I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman Collin Jackson

    I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman Collin Jackson

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16