1 |
Yarom Yuval and Katrina E. Falkner, "Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack," USENIX Security, 2014.
|
2 |
B. Gulmezoglu, M. Inci, G. Irazoki, T. Eisenbarth, and B. Sunar, "Cross-VM Cache Attacks on AES," IEEE Trans. Multi-Scale Comput. Syst., Vol.2, No.3, pp.211-222, 2016.
DOI
|
3 |
Daniel Gruss, Raphael Spreitzer, and Stefan Mangard, "Cache Template Attacks : Automating Attacks on Inclusive Last-Level Cache," USENIX Security Symposium 2015.
|
4 |
Daniel Gruss, Raphael Spreitzer, and Stefan Mangard, "Flush+Flush : A Fast and Stealthy Cache Attack," DIMVA 2016 Detection of Instruction and Malware, and Vulnerability Assessment.
|
5 |
Manuel Weber, Michael Schwarz, Lukas Giner, and Daniel Gruss, "Hello from the Other Side : SSH over Robust Cache Covert Channels in the Cloud." Network and Distributed System Security Symposium 2017 (NDSS'17).
|
6 |
Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar, "Systematic Reverse Engineering of Cache Slice Selection in Intel Processors," 2015 Euromicro Conference on Digital System Design (DSD).
|
7 |
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B Lee, "Last-Level Cache Side-Channel Attacks are Practical," 2015 IEEE Symposium on Security and Privacy.
|
8 |
Intel Performance Counter Monitor [Online] https://docs.it4i.cz/software/debuggers/intel-performance-counter-monitor/-Intel Performance Counter Monitor.
|
9 |
Machine Learning and Deep Learning for Everyone [Online], https://hunkim.github.io/ml/.
|
10 |
What is Artificial Neural Network? [Online], http://blog.lgcns.com/1359.
|
11 |
Y. Yarom, "Mastik: A Micro-Architectural Side-Channel Toolkit," [Online] https://cs.adelaide.edu.au/-yval/Mastik/.
|
12 |
Irazoqui, Gorka, et al. "Wait a minute! A fast, Cross-VM attack on AES," Research in Attacks, Intrusions and Defenses. Springer International Publishing, pp.299-319, 2014.
|