Filters








2 Hits in 7.1 sec

An algorithm for detecting contention-based covert timing channels on shared hardware

Jie Chen, Guru Venkataramani
2014 Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy - HASP '14  
In this work, we propose an algorithm to detect the possible presence of covert timing channels on shared hardware that use contention-based patterns for communication.  ...  the underlying system's security policy.  ...  Figure 1 : 1 HASP '14, June 15 2014, Minneapolis, MN, USA Copyright 2014 ACM 978-1-4503-2777-0/14/06...$15.00. http://dx.doi.org/10.1145/2611765.2611766.  ... 
doi:10.1145/2611765.2611766 dblp:conf/isca/0020V14 fatcat:lzhjsfx75rc35oaqjj4yecxdlu

ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS AGAINST THEORETICAL AND IMPLEMENTATION ATTACKS [article]

SILVIA MELLA
2018
A peculiar result of this method is that, besides the preferred candidate for the key, it also provides the preferred models for the fault.  ...  This thesis deals with theoretical and implementation analysis of cryptographic functions.  ...  In Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2014), pages 4:1-4:8. Minneapolis, MN, USA, June 15, 2014.  ... 
doi:10.13130/mella-silvia_phd2018-02-27 fatcat:phzf464ql5gvrdmhmbjzglsk4e