Sciweavers

3 search results - page 1 / 1
» Yet another MicroArchitectural Attack: : exploiting I-Cache
Sort
View
CCS
2007
ACM
14 years 7 days ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 6 days ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
WETICE
2008
IEEE
14 years 12 days ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor