Статті в журналах з теми "Microarchitectural attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-36 статей у журналах для дослідження на тему "Microarchitectural attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mao, Yuxiao, Vincent Migliore, and Vincent Nicomette. "MATANA: A Reconfigurable Framework for Runtime Attack Detection Based on the Analysis of Microarchitectural Signals." Applied Sciences 12, no. 3 (January 29, 2022): 1452. http://dx.doi.org/10.3390/app12031452.
Lou, Xiaoxuan, Tianwei Zhang, Jun Jiang, and Yinqian Zhang. "A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography." ACM Computing Surveys 54, no. 6 (July 2021): 1–37. http://dx.doi.org/10.1145/3456629.
Fournaris, Apostolos, Lidia Pocero Fraile, and Odysseas Koufopavlou. "Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks." Electronics 6, no. 3 (July 13, 2017): 52. http://dx.doi.org/10.3390/electronics6030052.
Shepherd, Michael, Scott Brookes, and Robert Denz. "Transient Execution and Side Channel Analysis: a Vulnerability or a Science Experiment?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 288–97. http://dx.doi.org/10.34190/iccws.17.1.20.
Gnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy, and Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention." Wireless Communications and Mobile Computing 2022 (July 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Di, Bang, Daokun Hu, Zhen Xie, Jianhua Sun, Hao Chen, Jinkui Ren, and Dong Li. "TLB-pilot: Mitigating TLB Contention Attack on GPUs with Microarchitecture-Aware Scheduling." ACM Transactions on Architecture and Code Optimization 19, no. 1 (March 31, 2022): 1–23. http://dx.doi.org/10.1145/3491218.
Gruss, Daniel. "Software-based microarchitectural attacks." it - Information Technology 60, no. 5-6 (December 19, 2018): 335–41. http://dx.doi.org/10.1515/itit-2018-0034.
Montasari, Reza, Amin Hosseinian-Far, Richard Hill, Farshad Montaseri, Mak Sharma, and Shahid Shabbir. "Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?" International Journal of Organizational and Collective Intelligence 8, no. 2 (April 2018): 32–59. http://dx.doi.org/10.4018/ijoci.2018040103.
Yong-Joon Park, Zhao Zhang, and Gyungho Lee. "Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks." IEEE Micro 26, no. 4 (July 2006): 62–71. http://dx.doi.org/10.1109/mm.2006.76.
Schwarz, Michael, and Daniel Gruss. "How Trusted Execution Environments Fuel Research on Microarchitectural Attacks." IEEE Security & Privacy 18, no. 5 (September 2020): 18–27. http://dx.doi.org/10.1109/msec.2020.2993896.
Genkin, Daniel, and Yuval Yarom. "Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]." IEEE Security & Privacy 19, no. 1 (January 2021): 95–98. http://dx.doi.org/10.1109/msec.2020.3036146.
Szefer, Jakub. "Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses." Journal of Hardware and Systems Security 3, no. 3 (September 13, 2018): 219–34. http://dx.doi.org/10.1007/s41635-018-0046-1.
Ge, Qian, Yuval Yarom, David Cock, and Gernot Heiser. "A survey of microarchitectural timing attacks and countermeasures on contemporary hardware." Journal of Cryptographic Engineering 8, no. 1 (December 26, 2016): 1–27. http://dx.doi.org/10.1007/s13389-016-0141-6.
Shin, Youngjoo. "Multibyte Microarchitectural Data Sampling and its Application to Session Key Extraction Attacks." IEEE Access 9 (2021): 80806–20. http://dx.doi.org/10.1109/access.2021.3085395.
Rajendran, Jeyavijayan, Arun Karthik Kanuparthi, Mohamed Zahran, Sateesh K. Addepalli, Gaston Ormazabal, and Ramesh Karri. "Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach." IEEE Design & Test 30, no. 2 (April 2013): 35–44. http://dx.doi.org/10.1109/mdat.2013.2249554.
Grycel, Jacob, and Patrick Schaumont. "SimpliFI: Hardware Simulation of Embedded Software Fault Attacks." Cryptography 5, no. 2 (June 7, 2021): 15. http://dx.doi.org/10.3390/cryptography5020015.
Yu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, and Christopher W. Fletcher. "Speculative taint tracking (STT)." Communications of the ACM 64, no. 12 (December 2021): 105–12. http://dx.doi.org/10.1145/3491201.
Omar, Hamza, Brandon D'Agostino, and Omer Khan. "OPTIMUS: A Security-Centric Dynamic Hardware Partitioning Scheme for Processors that Prevent Microarchitecture State Attacks." IEEE Transactions on Computers 69, no. 11 (November 1, 2020): 1558–70. http://dx.doi.org/10.1109/tc.2020.2996021.
Fournaris, Apostolos P., Konstantinos Lampropoulos, and Odysseas Koufopavlou. "End Node Security and Trust vulnerabilities in the Smart City Infrastructure." MATEC Web of Conferences 188 (2018): 05005. http://dx.doi.org/10.1051/matecconf/201818805005.
Cabodi, Gianpiero, Paolo Camurati, Fabrizio Finocchiaro, and Danilo Vendraminetto. "Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification." Electronics 8, no. 9 (September 19, 2019): 1057. http://dx.doi.org/10.3390/electronics8091057.
Sayadi, Hossein, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar Costa, Setareh Rafatirad, and Houman Homayoun. "Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach." Cryptography 5, no. 4 (October 17, 2021): 28. http://dx.doi.org/10.3390/cryptography5040028.
Sakalis, Christos, Stefanos Kaxiras, and Magnus Själander. "Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks." ACM Transactions on Architecture and Code Optimization, September 19, 2022. http://dx.doi.org/10.1145/3563695.
Ryan, Keegan. "Return of the Hidden Number Problem." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 9, 2018, 146–68. http://dx.doi.org/10.46586/tches.v2019.i1.146-168.
Stolz, Florian, Jan Philipp Thoma, Pascal Sasdrich, and Tim Güneysu. "Risky Translations: Securing TLBs against Timing Side Channels." IACR Transactions on Cryptographic Hardware and Embedded Systems, November 29, 2022, 1–31. http://dx.doi.org/10.46586/tches.v2023.i1.1-31.
Cabrera Aldaya, Alejandro, Cesar Pereida García, and Billy Bob Brumley. "From A to Z: Projective coordinates leakage in the wild." IACR Transactions on Cryptographic Hardware and Embedded Systems, June 19, 2020, 428–53. http://dx.doi.org/10.46586/tches.v2020.i3.428-453.
Chakraborty, Anirban, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, and Debdeep Mukhopadhyay. "RASSLE: Return Address Stack based Side-channel LEakage." IACR Transactions on Cryptographic Hardware and Embedded Systems, February 23, 2021, 275–303. http://dx.doi.org/10.46586/tches.v2021.i2.275-303.
Cabrera Aldaya, Alejandro, and Billy Bob Brumley. "Online Template Attacks: Revisited." IACR Transactions on Cryptographic Hardware and Embedded Systems, July 9, 2021, 28–59. http://dx.doi.org/10.46586/tches.v2021.i3.28-59.
Skarlatos, Dimitrios, Mengjia Yan, Bhargava Gopireddy, Read Sprabery, Josep Torrellas, and Christopher Fletcher. "MicroScope: Enabling Microarchitectural Replay Attacks." IEEE Micro, 2020, 1. http://dx.doi.org/10.1109/mm.2020.2986204.
Weissman, Zane, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, and Berk Sunar. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms." IACR Transactions on Cryptographic Hardware and Embedded Systems, June 19, 2020, 169–95. http://dx.doi.org/10.46586/tches.v2020.i3.169-195.
Naghibijouybari, Hoda, Esmaeil Mohammadian Koruyeh, and Nael Abu-Ghazaleh. "Microarchitectural Attacks in Heterogeneous Systems: A Survey." ACM Computing Surveys, June 15, 2022. http://dx.doi.org/10.1145/3544102.
Cabrera Aldaya, Alejandro, and Billy Bob Brumley. "When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 2, 2020, 196–221. http://dx.doi.org/10.46586/tches.v2020.i2.196-221.
Arikan, Kerem, Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Salvatore Pontarelli, Giuseppe Bianchi, Oguz Ergin, and Marco Ottavi. "Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches." IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2022, 1–14. http://dx.doi.org/10.1109/tvlsi.2022.3171810.
"Improving Performance and Mitigating Fault Attacks Using Value Prediction." Cryptography 2, no. 4 (September 23, 2018): 27. http://dx.doi.org/10.3390/cryptography2040027.
Gulmezoglu, Berk. "XAI-based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses." IEEE Transactions on Dependable and Secure Computing, 2021, 1. http://dx.doi.org/10.1109/tdsc.2021.3117145.
Gao, Si, Ben Marshall, Dan Page, and Thinh Pham. "FENL: an ISE to mitigate analogue micro-architectural leakage." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 2, 2020, 73–98. http://dx.doi.org/10.46586/tches.v2020.i2.73-98.
Sachlos, Eleftherios, Nuno Reis, Chris Ainsley, Brian Derby, and Jan T. Czernuszka. "A Process to Make Collagen Scaffolds with an Artificial Circulatory System using Rapid Prototyping." MRS Proceedings 758 (2002). http://dx.doi.org/10.1557/proc-758-ll5.3.