ret2spec
- 15 October 2018
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
- p. 2109-2122
- https://doi.org/10.1145/3243734.3243761
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- The Spy in the SandboxPublished by Association for Computing Machinery (ACM) ,2015
- The Devil is in the Constants: Bypassing Defenses in Browser JIT EnginesPublished by Internet Society ,2015
- Flipping bits in memory without accessing themACM SIGARCH Computer Architecture News, 2014
- Practical Timing Side Channel Attacks against Kernel Space ASLRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Improvement of trace-driven I-Cache timing attack on the RSA algorithmJournal of Systems and Software, 2013
- Cross-VM side channels and their use to extract private keysPublished by Association for Computing Machinery (ACM) ,2012
- New Results on Instruction Cache AttacksLecture Notes in Computer Science, 2010
- Yet another MicroArchitectural Attack:Published by Association for Computing Machinery (ACM) ,2007
- Cache Attacks and Countermeasures: The Case of AESLecture Notes in Computer Science, 2006
- On perfect codes in deletion and insertion metricDiscrete Mathematics and Applications, 1992