Academic literature on the topic 'Spectre attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spectre attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Spectre attack":
Xiong, Wenjie, and Jakub Szefer. "Survey of Transient Execution Attacks and Their Mitigations." ACM Computing Surveys 54, no. 3 (June 2021): 1–36. http://dx.doi.org/10.1145/3442479.
Coates, Oliver. "The Threat of Aerial Bombing in World War Two Lagos, 1938–1943." Journal of African Military History 4, no. 1-2 (October 26, 2020): 66–96. http://dx.doi.org/10.1163/24680966-bja10002.
Kelkar, Madhu. "Sanitizing Heritage—Hydraulic Water Supply and the Erosion of the Traditional Water Management System in Colonial Bombay City (1860–1947)." Journal of Heritage Management 4, no. 2 (December 2019): 123–40. http://dx.doi.org/10.1177/2455929619877014.
Strohmaier, Paul. "Heilsfiktionen." Romanistisches Jahrbuch 71, no. 1 (November 18, 2020): 169–203. http://dx.doi.org/10.1515/roja-2020-0005.
Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. "Spectre attacks." Communications of the ACM 63, no. 7 (June 18, 2020): 93–101. http://dx.doi.org/10.1145/3399742.
Göder, R., G. Fritzer, A. Kapsokalyvas, P. Kropp, U. Niederberger, H. Strenge, WD Gerber, and JB Aldenhoff. "Polysomnographic Findings in Nights Preceding a Migraine Attack." Cephalalgia 21, no. 1 (February 2001): 31–37. http://dx.doi.org/10.1046/j.1468-2982.2001.00141.x.
Schoenfeld, N., R. Mamet, I. Dotan, M. Sztern, Y. Levo, and D. Aderka. "Relation between Uroporphyrin Excretion, Acute Attacks of Hereditary Coproporphyria and Successful Treatment with Haem Arginate." Clinical Science 88, no. 3 (March 1, 1995): 365–69. http://dx.doi.org/10.1042/cs0880365.
Lal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, Talha Meraj, Hafiz Tayyab Rauf, Robertas Damaševičius, Mazin Abed Mohammed, and Karrar Hameed Abdulkareem. "Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition." Sensors 21, no. 11 (June 7, 2021): 3922. http://dx.doi.org/10.3390/s21113922.
Mohamed, Shaimaa, Amr Ghoneim, and Aliaa Youssif. "Visible/Infrared face spoofing detection using texture descriptors." MATEC Web of Conferences 292 (2019): 04006. http://dx.doi.org/10.1051/matecconf/201929204006.
Swamy, R. Kumara, and R. Hemavathi. "Spectro-temporal features for audio replay attack detection." International Journal of High Performance Computing and Networking 16, no. 2/3 (2020): 170. http://dx.doi.org/10.1504/ijhpcn.2020.10034823.
Dissertations / Theses on the topic "Spectre attack":
Harris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.
Borg, Isak. "Speculative Interference: A Modern Spectre Attack." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-450199.
Efter att säkerhetsattackerna kända som Spectre offentliggjordes i Januari 2018 har bådeforskare, utvecklare och intresserade individer experimenterat med att ta fram försvar mot dem. Det har också spenderats mycket resurser och tid på att finna sätt att kringgå dessa försvar och att hitta alternativa sido-kanaler och mekanismer som kan utnyttjas för att genomföra en Spectre-attack. Den här uppsatsen demonstrerar en fungerande implementation av en av dessa nyfunna attacker, känd som en ’Speculative interference attack’. Detta görs i en simulerad miljö, vilken enligt vår kännedom inte tidigare har gjorts vid genomförandet av detta arbete. Efter att en mer grundläggande version av en Spectre-attack har förklarats kommer uppsatsen att gå igenom hur den mer avancerade ’interference’ attacken fungerar och hur den är implementerad. I slutändan kommer de resultat attacken tagit fram att redogöras, vilket bör övertyga läsaren om attackens relevans och möjligheter.
Bowen, Lucy R. "The Performance Cost of Security." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2002.
Ben-Mosbah, Azza. "Privacy-preserving spectrum sharing." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0008/document.
Radio frequencies, as currently allocated, are statically managed. Spectrum sharing between commercial users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effectiveness in spectrum use. However, allowing secondary users to share frequency bands with sensitive government incumbent users creates new privacy threats in the form of inference attacks. Therefore, the aim of this thesis is to enhance the privacy of the incumbent while allowing secondary access to the spectrum. First, we present a brief description of different sharing regulations and privacy requirements in Federal bands. We also survey the privacy-preserving techniques (i.e., obfuscation) proposed in data mining and publishing to thwart inference attacks. Next, we propose and implement our approach to protect the operational frequency and location of the incumbent operations from inferences. We follow with research on frequency protection using inherent and explicit obfuscation to preserve the incumbent's privacy. Then, we address location protection using trust as the main countermeasure to identify and mitigate an inference risk. Finally, we present a risk-based framework that integrates our work and accommodates other privacy-preserving approaches. This work is supported with models, simulations and results that showcase our work and quantify the importance of evaluating privacy-preserving techniques and analyzing the trade-off between privacy protection and spectrum efficiency
Nicholson, Andrew. "Wide spectrum attribution : using deception for attribution intelligence in cyber attacks." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11418.
Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Master of Science
Grimsdal, Gunnar, and Patrik Lundgren. "Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159999.
Delvecchio, Matthew David. "Enhancing Communications Aware Evasion Attacks on RFML Spectrum Sensing Systems." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99792.
Master of Science
Deep learning has started infiltrating many aspects of society from the military, to academia, to commercial vendors. Additionally, with the recent deployment of 5G technology, connectivity is more readily accessible than ever and an increasingly large number of systems will communicate with one another across the globe. However, cybersecurity and electronic warfare call into question the very notion of privacy and confidentiality of data and communication streams. Deep learning has further improved these intercepting capabilities. However, these deep learning systems have also been shown to be vulnerable to attack. This thesis exists at the nexus of these two problems, both machine learning and communication security. This work expands upon adversarial evasion attacks meant to help elude signal classification at a deep learning-enabled eavesdropper while still providing reliable communications to a friendly receiver. By doing so, this work both provides a new methodology that can be used to conceal communication information from unwanted parties while also highlighting the glaring vulnerabilities present in machine learning systems.
Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.
Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Ph. D.
Books on the topic "Spectre attack":
Michael, Green. Night attack gunships: The AC-130H spectres. Mankato, Minn: Capstone Press, 2008.
Filip, Corneliu. America sub spectrul terorismului: Consemnări de călător în S.U.A., Canada și Mexic. Botoșani: AXA, 2002.
Michael, Green, and Gladys Green. Night Attack Gunships: The Ac-130H Spectres (War Planes). Capstone High-Interest Books, 2003.
Lichtman, Robert M. The “Red Monday” Decisions, Jencks, and a Crescendo of Anti-Court Attacks. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037009.003.0007.
Matiello, Marcelo, and Tamara B. Kaplan. A Mother Who Could Not See Her Baby. Edited by Angela O’Neal. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190609917.003.0027.
Coyle, Patricia K. Immune-mediated Disorders of the Central Nervous System. Edited by Emma Ciafaloni, Cheryl Bushnell, and Loralei L. Thornburg. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190667351.003.0010.
Khan, Muhammad Asim. Clinical features. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780198734444.003.0011.
Saperstein, Marc. Jewish Preaching in Times of War, 1800 - 2001. Liverpool University Press, 2012. http://dx.doi.org/10.3828/liverpool/9781906764401.001.0001.
Scaglia, Ilaria. The Emotions of Internationalism. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198848325.001.0001.
Byman, Daniel. Al Qaeda, the Islamic State, and the Global Jihadist Movement. Oxford University Press, 2015. http://dx.doi.org/10.1093/wentk/9780190217259.001.0001.
Book chapters on the topic "Spectre attack":
Boothby, Bill. "Autonomous Attack—Opportunity or Spectre?" In Yearbook of International Humanitarian Law 2013, 71–88. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-038-1_4.
Kavut, Selçuk, and Melek D. Yücel. "Slide Attack on Spectr-H64." In Progress in Cryptology — INDOCRYPT 2002, 34–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36231-2_4.
Joshi, Francis R., and Elizabeth A. Warburton. "Transient Ischaemic Attack (Neuroimaging Findings)." In PET and SPECT in Neurology, 547–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54307-4_24.
Wang, Jingjing, Kefei Chen, and Shixiong Zhu. "Annihilators of Fast Discrete Fourier Spectra Attacks." In Advances in Information and Computer Security, 182–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34117-5_12.
Chingovska, Ivana, Nesli Erdogmus, André Anjos, and Sébastien Marcel. "Face Recognition Systems Under Spoofing Attacks." In Face Recognition Across the Imaging Spectrum, 165–94. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28501-6_8.
Dehbaoui, Amine, Victor Lomne, Philippe Maurine, Lionel Torres, and Michel Robert. "Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography." In VLSI-SoC: Technologies for Systems Integration, 135–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23120-9_8.
Cao, Jian, and Jiwu Huang. "Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework." In Information Hiding, 249–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16435-4_19.
Chang, Hong, and Yong Li. "Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game." In Communications and Networking, 450–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78139-6_45.
Lounis, Karim, and Mohammad Zulkernine. "Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs." In Lecture Notes in Computer Science, 49–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68887-5_3.
Chatterjee, Pinaki Sankar, and Monideepa Roy. "Base Station Controlled Spectrum Allocation Technique to Detect the PUE Attack in CWSN." In Computational Intelligence in Data Mining - Volume 1, 689–98. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2205-7_63.
Conference papers on the topic "Spectre attack":
Ayoub, Pierre, and Clémentine Maurice. "Reproducing Spectre Attack with gem5." In EuroSys '21: Sixteenth European Conference on Computer Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447852.3458715.
Abdul Kadir, Mohd Fadzil, Jin Kee Wong, Fauziah Ab Wahab, Ahmad Faisal Amri Abidin Bharun, Mohamad Afendee Mohamed, and Aznida Hayati Zakaria. "Retpoline Technique for Mitigating Spectre Attack." In 2019 6th International Conference on Electrical and Electronics Engineering (ICEEE). IEEE, 2019. http://dx.doi.org/10.1109/iceee2019.2019.00026.
Kovalchuk, Lyudmila, Mariia Rodinko, and Roman Oliynykov. "Upper bound probability of double spend attack on SPECTRE." In MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3410699.3413792.
Johnson, Andrew, and Ross Davies. "Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods." In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2019. http://dx.doi.org/10.1109/isdfs.2019.8757547.
Fazio, Peppino, Mauro Tropea, Salvatore Marano, and Miroslav Voznak. "Meaningful attack graph reconstruction through stochastic marking analysis." In 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2016. http://dx.doi.org/10.1109/spects.2016.7570519.
Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. "Spectre Attacks: Exploiting Speculative Execution." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00002.
K Das, Ashish, Quynh Thi Nguyen, and Susan Thomas. "Entertaining Whilst Defacing Websites: Psychological Games for Hackers." In InSITE 2017: Informing Science + IT Education Conferences: Vietnam. Informing Science Institute, 2017. http://dx.doi.org/10.28945/3721.
Hodgers, P., K. H. Boey, and M. O'Neill. "Variable window power spectral density attack." In 2011 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2011. http://dx.doi.org/10.1109/wifs.2011.6123145.
Fulai Liu, Ying Zhou, Zhenxing Sun, Ruiyan Du, and Juan Sheng. "Dynamic attack probability based Spectrum Sensing against Byzantine attack in Cognitive Radio." In 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924951.
Garnaev, Andrey, Wade Trappe, Y. Thomas Hou, and Wenjing Lou. "Spectrum attacks aimed at minimizing spectrum opportunities." In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2017. http://dx.doi.org/10.1109/icassp.2017.7952525.