共 50 条
- [41] Identifying Previously Requested Content by Side-Channel Timing Attack in NDN FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 33 - 46
- [42] ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage 2022 20TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2022,
- [43] Preventing Timing Side-Channel Attacks in Software-Defined Networks 2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
- [45] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
- [46] Automated design of cryptographic devices resistant to multiple side-channel attacks CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413
- [47] ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 749 - 763
- [48] CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6843 - 6860
- [50] Minimizing Side-Channel Attack Vulnerability via Schedule Randomization 2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 2928 - 2933