Are AES x86 cache timing attacks still feasible?
- 19 October 2012
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Cross-VM side channels and their use to extract private keysPublished by Association for Computing Machinery (ACM) ,2012
- Eliminating fine grained timers in XenPublished by Association for Computing Machinery (ACM) ,2011
- An exploration of L2 cache covert channels in virtualized environmentsPublished by Association for Computing Machinery (ACM) ,2011
- Determinating timing channels in compute cloudsPublished by Association for Computing Machinery (ACM) ,2010
- Hey, you, get off of my cloudPublished by Association for Computing Machinery (ACM) ,2009
- Efficient Cache Attacks on AES, and CountermeasuresJournal of Cryptology, 2009
- Yet another MicroArchitectural Attack:Published by Association for Computing Machinery (ACM) ,2007
- Cache-Collision Timing Attacks Against AESPublished by Springer Nature ,2006
- Predicting Secret Keys Via Branch PredictionPublished by Springer Nature ,2006
- An effective on-chip preloading scheme to reduce data access penaltyPublished by Association for Computing Machinery (ACM) ,1991