共 50 条
- [21] Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack PROCEEDINGS OF THE 2023 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2023, 2023, : 59 - 66
- [23] Attacks on ML Systems: From Security Analysis to Attack Mitigation INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 119 - 138
- [25] Convergence-provable statistical timing analysis with level-sensitive latches and feedback loops ASP-DAC 2006: 11TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 2006, : 941 - 946
- [26] Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security ISCA 2011: PROCEEDINGS OF THE 38TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, 2011, : 189 - 199
- [27] Timing-based side-channel attack and mitigation on PCIe connected distributed embedded systems 2021 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2021,
- [28] Quantitative analysis of sliding window attack for the RSA timing channel 1600, Science Press (44): : 114 - 120
- [29] Analysis of Formation Attack based on Information Submarine PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 102 - 107
- [30] Analysis and Mitigation of Process Variation Impacts on Power-Attack Tolerance DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 238 - 243