publication . Preprint . Conference object . 2017

Software-based Microarchitectural Attacks

Daniel Gruss;
Open Access English
  • Published: 19 Jun 2017
Abstract
Comment: PhD Thesis. Graz University of Technology. June, 2017
Subjects
free text keywords: Computer Science - Cryptography and Security
Related Organizations
Funded by
EC| HECTOR
Project
HECTOR
HARDWARE ENABLED CRYPTO AND RANDOMNESS
  • Funder: European Commission (EC)
  • Project Code: 644052
  • Funding stream: H2020 | RIA
,
EC| MATTHEW
Project
MATTHEW
Multi-entity-security using active Transmission Technology for improved Handling of Exportable security credentials Without privacy restrictions
  • Funder: European Commission (EC)
  • Project Code: 610436
  • Funding stream: FP7 | SP1 | ICT

200 250 300 Latency in cycles D. J. Bernstein. Cache-Timing Attacks on AES. 2004. url: http://cr.yp.to/papers.html#cachetiming (p. 252).

D. Gruss, C. Maurice, K. Wagner, and S. Mangard. Flush+ Flush: A Fast and Stealthy Cache Attack. In: DIMVA'16.

2016 (pp. 245, 261, 268, 270).

F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R. B. Lee. LastLevel Cache Side-Channel Attacks are Practical. In: S&P'15.

2015 (pp. 245, 252, 261).

In: CCS'04. 2004 (p. 245).

K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A. R. Sadeghi. Just-in-time code reuse: On the e ectiveness of ne-grained address space layout randomization. In: S&P'13. 2013 (p. 250). [OpenAIRE]

Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue