NDA
- 12 October 2019
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 572-586
- https://doi.org/10.1145/3352460.3358306
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Secure Hierarchy-Aware Cache Replacement Policy (SHARP)Published by Association for Computing Machinery (ACM) ,2017
- ReplayConfusion: Detecting cache-based covert channel attacks using record and replayPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- C5: Cross-Cores Cache Covert ChannelPublished by Springer Science and Business Media LLC ,2015
- Return-Oriented ProgrammingACM Transactions on Information and System Security, 2012
- An exploration of L2 cache covert channels in virtualized environmentsPublished by Association for Computing Machinery (ACM) ,2011
- The gem5 simulatorACM SIGARCH Computer Architecture News, 2011
- When good instructions go badPublished by Association for Computing Machinery (ACM) ,2008
- The geometry of innocent flesh on the bonePublished by Association for Computing Machinery (ACM) ,2007
- Cache-Collision Timing Attacks Against AESLecture Notes in Computer Science, 2006
- Microarchitecture optimizations for exploiting memory-level parallelismPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004