Side-channel attack

Results: 129



#Item
1A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research   Nael Abu-Ghazaleh

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2016-02-23 16:36:47
    2May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

    May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2017-08-27 19:43:58
      3BranchScope: A New Side-Channel Attack on Directional Branch Predictor

      BranchScope: A New Side-Channel Attack on Directional Branch Predictor

      Add to Reading List

      Source URL: www.cs.ucr.edu

      - Date: 2018-03-24 11:37:13
        4Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

        Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

        Add to Reading List

        Source URL: www.risec.aist.go.jp

        - Date: 2013-05-13 02:21:55
          5Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Add to Reading List

          Source URL: cs.tau.ac.il

          Language: English - Date: 2009-06-25 15:56:23
          6Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

          Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          7Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

          Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

          Add to Reading List

          Source URL: www.hotchips.org

          Language: English - Date: 2015-08-21 02:18:30
          8Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine  Physical attacks

          Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

          Add to Reading List

          Source URL: esec-lab.sogeti.com

          Language: English - Date: 2016-07-01 12:08:46
          9Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin  Lev Pachmanov

          Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

          Add to Reading List

          Source URL: www.cs.tau.ac.il

          Language: English - Date: 2015-03-03 02:38:59
          10Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

          Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01