Timing channel

Results: 65



#Item
1

Fingerprinting Tor’s Hidden Service Log Files Using a Timing Channel Juan A. Elices #1 , Fernando P´erez-Gonz´alez ∗,#2 , Carmela Troncoso +3 # 1

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:19:14
    2

    Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa

    Add to Reading List

    Source URL: users.elis.ugent.be

    Language: English - Date: 2009-07-23 13:04:51
      3

      KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks Michael Schwarz∗ , Moritz Lipp∗ , Daniel Gruss∗ , Samuel Weiser∗ , Cl´ementine Maurice† , Raphael Spreitzer∗ , Stefan Mangard∗ {mi

      Add to Reading List

      Source URL: mlq.me

      - Date: 2018-03-02 04:05:47
        4

        KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks Michael Schwarz∗ , Moritz Lipp∗ , Daniel Gruss∗ , Samuel Weiser∗ , Cl´ementine Maurice† , Raphael Spreitzer∗ , Stefan Mangard∗ {mi

        Add to Reading List

        Source URL: gruss.cc

        - Date: 2017-12-04 11:02:45
          5Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

          Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          6Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

          Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          7Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

          IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

          Add to Reading List

          Source URL: coleman.ucsd.edu

          Language: English
          8Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

          64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

          Add to Reading List

          Source URL: coleman.ucsd.edu

          Language: English
          9Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

          Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

          Add to Reading List

          Source URL: www.ll.mit.edu

          Language: English - Date: 2016-07-12 15:04:32
          10Electrical engineering / Electromagnetism / Electronics / Electronic circuits / Cartography / Distortion / Optics / Convolution / Electronic filter / Amplifier

          ESTIMATING TIMING AND CHANNEL DISTORTION ACROSS RELATED SIGNALS Colin Raffel, Daniel P. W. Ellis LabROSA, Dept. of Electrical Engineering Columbia University {craffel, dpwe}@ee.columbia.edu ABSTRACT

          Add to Reading List

          Source URL: colinraffel.com

          Language: English - Date: 2015-11-09 14:28:44
          UPDATE