Journal articles on the topic 'Microarchitectural attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 journal articles for your research on the topic 'Microarchitectural attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mao, Yuxiao, Vincent Migliore, and Vincent Nicomette. "MATANA: A Reconfigurable Framework for Runtime Attack Detection Based on the Analysis of Microarchitectural Signals." Applied Sciences 12, no. 3 (January 29, 2022): 1452. http://dx.doi.org/10.3390/app12031452.
Lou, Xiaoxuan, Tianwei Zhang, Jun Jiang, and Yinqian Zhang. "A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography." ACM Computing Surveys 54, no. 6 (July 2021): 1–37. http://dx.doi.org/10.1145/3456629.
Fournaris, Apostolos, Lidia Pocero Fraile, and Odysseas Koufopavlou. "Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks." Electronics 6, no. 3 (July 13, 2017): 52. http://dx.doi.org/10.3390/electronics6030052.
Shepherd, Michael, Scott Brookes, and Robert Denz. "Transient Execution and Side Channel Analysis: a Vulnerability or a Science Experiment?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 288–97. http://dx.doi.org/10.34190/iccws.17.1.20.
Gnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy, and Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention." Wireless Communications and Mobile Computing 2022 (July 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Di, Bang, Daokun Hu, Zhen Xie, Jianhua Sun, Hao Chen, Jinkui Ren, and Dong Li. "TLB-pilot: Mitigating TLB Contention Attack on GPUs with Microarchitecture-Aware Scheduling." ACM Transactions on Architecture and Code Optimization 19, no. 1 (March 31, 2022): 1–23. http://dx.doi.org/10.1145/3491218.
Gruss, Daniel. "Software-based microarchitectural attacks." it - Information Technology 60, no. 5-6 (December 19, 2018): 335–41. http://dx.doi.org/10.1515/itit-2018-0034.
Montasari, Reza, Amin Hosseinian-Far, Richard Hill, Farshad Montaseri, Mak Sharma, and Shahid Shabbir. "Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?" International Journal of Organizational and Collective Intelligence 8, no. 2 (April 2018): 32–59. http://dx.doi.org/10.4018/ijoci.2018040103.
Yong-Joon Park, Zhao Zhang, and Gyungho Lee. "Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks." IEEE Micro 26, no. 4 (July 2006): 62–71. http://dx.doi.org/10.1109/mm.2006.76.
Schwarz, Michael, and Daniel Gruss. "How Trusted Execution Environments Fuel Research on Microarchitectural Attacks." IEEE Security & Privacy 18, no. 5 (September 2020): 18–27. http://dx.doi.org/10.1109/msec.2020.2993896.
Genkin, Daniel, and Yuval Yarom. "Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]." IEEE Security & Privacy 19, no. 1 (January 2021): 95–98. http://dx.doi.org/10.1109/msec.2020.3036146.
Szefer, Jakub. "Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses." Journal of Hardware and Systems Security 3, no. 3 (September 13, 2018): 219–34. http://dx.doi.org/10.1007/s41635-018-0046-1.
Ge, Qian, Yuval Yarom, David Cock, and Gernot Heiser. "A survey of microarchitectural timing attacks and countermeasures on contemporary hardware." Journal of Cryptographic Engineering 8, no. 1 (December 26, 2016): 1–27. http://dx.doi.org/10.1007/s13389-016-0141-6.
Shin, Youngjoo. "Multibyte Microarchitectural Data Sampling and its Application to Session Key Extraction Attacks." IEEE Access 9 (2021): 80806–20. http://dx.doi.org/10.1109/access.2021.3085395.
Rajendran, Jeyavijayan, Arun Karthik Kanuparthi, Mohamed Zahran, Sateesh K. Addepalli, Gaston Ormazabal, and Ramesh Karri. "Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach." IEEE Design & Test 30, no. 2 (April 2013): 35–44. http://dx.doi.org/10.1109/mdat.2013.2249554.
Grycel, Jacob, and Patrick Schaumont. "SimpliFI: Hardware Simulation of Embedded Software Fault Attacks." Cryptography 5, no. 2 (June 7, 2021): 15. http://dx.doi.org/10.3390/cryptography5020015.
Yu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, and Christopher W. Fletcher. "Speculative taint tracking (STT)." Communications of the ACM 64, no. 12 (December 2021): 105–12. http://dx.doi.org/10.1145/3491201.
Omar, Hamza, Brandon D'Agostino, and Omer Khan. "OPTIMUS: A Security-Centric Dynamic Hardware Partitioning Scheme for Processors that Prevent Microarchitecture State Attacks." IEEE Transactions on Computers 69, no. 11 (November 1, 2020): 1558–70. http://dx.doi.org/10.1109/tc.2020.2996021.
Fournaris, Apostolos P., Konstantinos Lampropoulos, and Odysseas Koufopavlou. "End Node Security and Trust vulnerabilities in the Smart City Infrastructure." MATEC Web of Conferences 188 (2018): 05005. http://dx.doi.org/10.1051/matecconf/201818805005.
Cabodi, Gianpiero, Paolo Camurati, Fabrizio Finocchiaro, and Danilo Vendraminetto. "Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification." Electronics 8, no. 9 (September 19, 2019): 1057. http://dx.doi.org/10.3390/electronics8091057.
Sayadi, Hossein, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar Costa, Setareh Rafatirad, and Houman Homayoun. "Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach." Cryptography 5, no. 4 (October 17, 2021): 28. http://dx.doi.org/10.3390/cryptography5040028.
Sakalis, Christos, Stefanos Kaxiras, and Magnus Själander. "Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks." ACM Transactions on Architecture and Code Optimization, September 19, 2022. http://dx.doi.org/10.1145/3563695.
Ryan, Keegan. "Return of the Hidden Number Problem." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 9, 2018, 146–68. http://dx.doi.org/10.46586/tches.v2019.i1.146-168.
Stolz, Florian, Jan Philipp Thoma, Pascal Sasdrich, and Tim Güneysu. "Risky Translations: Securing TLBs against Timing Side Channels." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 29, 2022, 1–31. http://dx.doi.org/10.46586/tches.v2023.i1.1-31.
Cabrera Aldaya, Alejandro, Cesar Pereida García, and Billy Bob Brumley. "From A to Z: Projective coordinates leakage in the wild." IACR Transactions on Cryptographic Hardware and Embedded Systems, June 19, 2020, 428–53. http://dx.doi.org/10.46586/tches.v2020.i3.428-453.
Chakraborty, Anirban, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, and Debdeep Mukhopadhyay. "RASSLE: Return Address Stack based Side-channel LEakage." IACR Transactions on Cryptographic Hardware and Embedded Systems, February 23, 2021, 275–303. http://dx.doi.org/10.46586/tches.v2021.i2.275-303.
Cabrera Aldaya, Alejandro, and Billy Bob Brumley. "Online Template Attacks: Revisited." IACR Transactions on Cryptographic Hardware and Embedded Systems, July 9, 2021, 28–59. http://dx.doi.org/10.46586/tches.v2021.i3.28-59.
Skarlatos, Dimitrios, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, and Christopher Fletcher. "MicroScope: Enabling Microarchitectural Replay Attacks." IEEE Micro, 2020, 1. http://dx.doi.org/10.1109/mm.2020.2986204.
Weissman, Zane, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, and Berk Sunar. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms." IACR Transactions on Cryptographic Hardware and Embedded Systems, June 19, 2020, 169–95. http://dx.doi.org/10.46586/tches.v2020.i3.169-195.
Naghibijouybari, Hoda, Esmaeil Mohammadian Koruyeh, and Nael Abu-Ghazaleh. "Microarchitectural Attacks in Heterogeneous Systems: A Survey." ACM Computing Surveys, June 15, 2022. http://dx.doi.org/10.1145/3544102.
Cabrera Aldaya, Alejandro, and Billy Bob Brumley. "When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 2, 2020, 196–221. http://dx.doi.org/10.46586/tches.v2020.i2.196-221.
Arikan, Kerem, Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Salvatore Pontarelli, Giuseppe Bianchi, Oguz Ergin, and Marco Ottavi. "Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches." IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2022, 1–14. http://dx.doi.org/10.1109/tvlsi.2022.3171810.
"Improving Performance and Mitigating Fault Attacks Using Value Prediction." Cryptography 2, no. 4 (September 23, 2018): 27. http://dx.doi.org/10.3390/cryptography2040027.
Gulmezoglu, Berk. "XAI-based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3117145.
Gao, Si, Ben Marshall, Dan Page, and Thinh Pham. "FENL: an ISE to mitigate analogue micro-architectural leakage." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 2, 2020, 73–98. http://dx.doi.org/10.46586/tches.v2020.i2.73-98.
Sachlos, Eleftherios, Nuno Reis, Chris Ainsley, Brian Derby, and Jan T. Czernuszka. "A Process to Make Collagen Scaffolds with an Artificial Circulatory System using Rapid Prototyping." MRS Proceedings 758 (2002). http://dx.doi.org/10.1557/proc-758-ll5.3.