Sciweavers

3 search results - page 1 / 1
» Yet another MicroArchitectural Attack: : exploiting I-Cache
Sort
View
CCS
2007
ACM
13 years 11 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
13 years 11 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
WETICE
2008
IEEE
13 years 11 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor