A survey on attack vectors in stack cache memory
- 14 February 2020
- journal article
- review article
- Published by Elsevier BV in Integration
- Vol. 72, 134-147
- https://doi.org/10.1016/j.vlsi.2020.02.004
Abstract
No abstract availableKeywords
Funding Information
- Florida Center for Cybersecurity (#3910-1006-00-D)
This publication has 36 references indexed in Scilit:
- Covert Channels through Random Number GeneratorPublished by Association for Computing Machinery (ACM) ,2016
- Cache Attacks Enable Bulk Key Recovery on the CloudPublished by Springer Science and Business Media LLC ,2016
- A high-resolution side-channel attack on last-level cachePublished by Association for Computing Machinery (ACM) ,2016
- ASLR-GuardPublished by Association for Computing Machinery (ACM) ,2015
- Last-Level Cache Side-Channel Attacks are PracticalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Thwarting Cache Side-Channel Attacks Through Dynamic Software DiversityPublished by Internet Society ,2015
- A programmable memory controller for the DDRx interfacing standardsACM Transactions on Computer Systems, 2013
- Practical Timing Side Channel Attacks against Kernel Space ASLRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Page placement algorithms for large real-indexed cachesACM Transactions on Computer Systems, 1992