Defense Against Cache Based Micro-architectural Side Channel Attacks

作者: Sahil Bhat

DOI:

关键词: CacheComputer securitySide channel attackComputer scienceHardware security module

摘要:

参考文章(21)
Yuval Yarom, Katrina Falkner, None, FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack usenix security symposium. pp. 719- 732 ,(2014)
M.R. Guthaus, T. Mudge, R.B. Brown, D. Ernst, T.M. Austin, J.S. Ringenberg, MiBench: A free, commercially representative embedded benchmark suite ieee international symposium on workload characterization. pp. 3- 14 ,(2001) , 10.1109/WWC.2001.15
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee, Last-Level Cache Side-Channel Attacks are Practical 2015 IEEE Symposium on Security and Privacy. pp. 605- 622 ,(2015) , 10.1109/SP.2015.43
Christopher W. Fletcher, Rachael Harding, Omer Khan, Srinivas Devadas, A low-overhead dynamic optimization framework for multicores Proceedings of the 21st international conference on Parallel architectures and compilation techniques - PACT '12. pp. 467- 468 ,(2012) , 10.1145/2370816.2370899
Sören Bleikertz, Carsten Vogel, Thomas Groß, Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures annual computer security applications conference. pp. 26- 35 ,(2014) , 10.1145/2664243.2664274
Grégoire Jacob, Hervé Debar, Eric Filiol, Behavioral detection of malware: from a survey towards an established taxonomy Journal in Computer Virology. ,vol. 4, pp. 251- 266 ,(2008) , 10.1007/S11416-008-0086-0
John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore Stolfo, On the feasibility of online malware detection with performance counters international symposium on computer architecture. ,vol. 41, pp. 559- 570 ,(2013) , 10.1145/2485922.2485970
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings ieee european symposium on security and privacy. pp. 372- 387 ,(2016) , 10.1109/EUROSP.2016.36
Alberto Garcia-Serrano, Anomaly Detection for malware identification using Hardware Performance Counters. arXiv: Cryptography and Security. ,(2015)
Mohammad Bagher Bahador, Mahdi Abadi, Asghar Tajoddin, HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on. pp. 703- 708 ,(2014) , 10.1109/ICCKE.2014.6993402