A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
In this work, we propose an algorithm to detect the possible presence of covert timing channels on shared hardware that use contention-based patterns for communication. ... the underlying system's security policy. ... Figure 1 : 1 HASP '14, June 15 2014, Minneapolis, MN, USA Copyright 2014 ACM 978-1-4503-2777-0/14/06...$15.00. http://dx.doi.org/10.1145/2611765.2611766. ...doi:10.1145/2611765.2611766 dblp:conf/isca/0020V14 fatcat:lzhjsfx75rc35oaqjj4yecxdlu
A peculiar result of this method is that, besides the preferred candidate for the key, it also provides the preferred models for the fault. ... This thesis deals with theoretical and implementation analysis of cryptographic functions. ... In Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2014), pages 4:1-4:8. Minneapolis, MN, USA, June 15, 2014. ...doi:10.13130/mella-silvia_phd2018-02-27 fatcat:phzf464ql5gvrdmhmbjzglsk4e