[1] |
Kocher P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[C]∥Proc of the 16th Annual International Cryptology Conference,1996:104-113.
|
[2] |
Kocher P,Jaffe J,Jun B.Differential power analysis[C]∥Proc of the 19th Annual International Cryptology Conference,1999:388-397.
|
[3] |
Mangard S.A simple power-analysis (SPA) attack on implementations of the AES key expansion[C]∥Proc of the 5th International Conference on Information Security and Cryptology,2003:343-358.
|
[4] |
Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C]∥Proc of the 6th International Conference on Cryptographic Hardware and Embedded Systems,2004:16-29.
|
[5] |
Bernstein D J. Cache-timing attacks on AES [EB/OL]. [2023-05-23]. https://mimoza.mamara.edu.tr/~mskalli/cse466_09/cache timing-20050414.pdf.
|
[6] |
Hund R,Willems C,Holz T.Practical timing side channel attacks against kernel space ASLR[C]∥Proc of 2013 IEEE Symposium on Security and Privacy,2013:191-205.
|
[7] |
Osvik D A,Shamir A,Tromer E.Cache attacks and countermeasures:The case of AES[C]∥Proc of the Cryptographers’ Track at the RSA Conference,2006:1-20.
|
[8] |
Zhang Y,Juels A,Reiter M K,et al.Cross-VM side channels and their use to extract private keys[C]∥Proc of the 2012 ACM Conference on Computer and Communications Security,2012:305-316.
|
[9] |
Yarom Y, Genkin D,Heninger N.CacheBleed:A timing attack on OpenSSL constant-time RSA[J].Journal of Cryptographic Engineering,2017,7:99-112.
|
[10] |
Kocher P,Horn J,Fogh A,et al.Spectre attacks:Exploiting speculative execution[J].Communications of the ACM,2020,63(7):93-101.
|
[11] |
Lipp M,Schwarz M,Gruss D,et al.Meltdown:Reading kernel memory from user space[J].Communications of the ACM,2020,63(6):46-56.
|
[12] |
van Bulck J, Minkin M,Weisse O,et al.Foreshadow:Extracting the keys to the Intel SGX kingdom with transient out-of-order execution[C]∥Proc of the 27th USENIX Conference on Security Symposium,2018:991-1008.
|
[13] |
Chen G X,Chen S C,Xiao Y,et al.SgxPectre:Stealing Intel secrets from SGX enclaves via speculative execution[C]∥Proc of 2019 IEEE European Symposium on Security and Privacy,2019:142-157.
|
[14] |
Su C,Zeng Q.Survey of CPU cache-based side-channel attacks:Systematic analysis,security models,and countermeasures[J].Security and Communication Networks,2021:1-15.
|
[15] |
Gruss D,Maurice C,Wagner K,et al.Flush+Flush:A fast and stealthy cache attack[C]∥Proc of the 13th International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment,2016:279-299.
|
[16] |
Yarom Y, Falkner K.Flush+Reload:A high resolution,low noise,L3 cache side-channel attack[C]∥Proc of the 23rd USENIX Security Symposium, 2014:719-732.
|
[17] |
Liu F,Yarom Y,Ge Q,et al.Last-level cache side-channel attacks are practical[C]∥Proc of 2015 IEEE Symposium on Security and Privacy,2015:605-622.
|
[18] |
Briongos S,Malagón P,Moya J M,et al.Reload+Refresh:Abusing cache replacement policies to perform stealthy cache attacks[C]∥Proc of the 29th USENIX Conference on Security Symposium,2020:1967-1984.
|
[19] |
Mushtaq M,Akram A,Bhatti M K,et al.Nights-watch:A cache-based side-channel intrusion detector using hardware performance counters[C]∥Proc of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy,2018:1-8.
|
[20] |
Allaf Z,Adda M,Gegov A.A comparison study on Flush+Reload and Prime+Probe attacks on AES using machine learning approaches[C]∥Proc of the 17th UK Workshop on Computational Intelligence:Advances in Computational Intelligence Systems,2018:203-213.
|
[21] |
Briongos S,Irazoqui G,Malagón P,et al.CacheShield:Detecting cache attacks through self-observation[C]∥Proc of the 8th ACM Conference on Data and Application Security and Privacy,2018:224-235.
|
[22] |
Tong Z,Zhu Z,Wang Z,et al.Cache side-channel attacks detection based on machine learning[C]∥Proc of 2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications,2020:919-926.
|
[23] |
Kulah Y, Dincer B, Yilmaz C,et al.SpyDetector:An approach for detecting side-channel attacks at runtime[J].International Journal of Information Security,2019,18:393-422.
|
[24] |
Demme J,Maycock M,Schmitz J,et al.On the feasibility of online malware detection with performance counters[C]∥Proc of the 40th Annual International Symposium on Computer Architecture,2013:559-570.
|
[25] |
Wang H, Sayadi H,Kolhe G,et al.Phased-guard:Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks[C]∥Proc of 2020 IEEE 38th International Conference on Computer Design,2020:648-655.
|
[26] |
Ou Y, Li L.Side-channel analysis attacks based on deep learning network[J].Frontiers of Computer Science,2022,16:10-11.
|
[27] |
Gruss D,Spreitzer R,Mangard S.Cache template attacks:Automating attacks on inclusive last-level caches[C] ∥Proc of the 24th USENIX Security Symposium,2015:897-912.
|
[28] |
Le A T,Hoang T T,Dao B A,et al.A real-time cache side-channel attack detection system on RISC-V out-of-order processor[J].IEEE Access,2021,9:164597-164612.
|
[29] |
Sangeetha G,Sumathi G.An optimistic technique to detect cache based side channel attacks in cloud[J].Peer-to-Peer Networking and Applications,2021,14:2473-2486.
|
[30] |
Zhang T,Zhang Y,Lee R B.Analyzing cache side channels using deep neural networks[C]∥Proc of the 34th Annual Computer Security Applications Conference,2018:174-186.
|
[31] |
Gnanavel S,Narayana K E,Jayashree K,et al.Implementation of block-level double encryption based on machine learning techniques for attack detection and prevention[J].Wireless Communications and Mobile Computing,2022(2):21-30.
|
[32] |
Oshana R,Thornton M A,Caraman M.A side channel attack detection system using processor core events and a support vector machine[C]∥Proc of 2022 11th Mediterranean Conference on Embedded Computing,2022:1-8.
|
[33] |
Chiappetta M,Savas E,Yilmaz C.Real time detection of cache-based side-channel attacks using hardware performance counters[J].Applied Soft Computing,2016,49:1162-1174.
|
[34] |
Irazoqui G,Inci M S,Eisenbarth T,et al.Know thy neighbor:Cryptolibrary detection in cloud[J].Proceedings on Privacy Enhancing Technologies,2015,2015:25-40.
|
[35] |
Zhang T W, Zhang Y Q,Lee R B.CloudRadar:A real-time side-channel attack detection system in clouds[C]∥Proc of the 19th International Symposium on Research in Attacks,Intrusions,and Defenses,2016:118-140.
|
[36] |
Shusterman A,Kang L,Haskal Y,et al.Robust website fingerprinting through the cache occupancy channel[C]∥Proc of the 28th USENIX Security Symposium,2019:639-656.
|
[37] |
Chen J, Venkataramani G.CC-Hunter:Uncovering covert timing channels on shared processor hardware[C]∥Proc of the 47th Annual IEEE/ACM International Symposium on Microarchitecture,2014:216-228.
|
[38] |
Sabbagh M,Fei Y S,Wahl T,et al.SCADET:A side-channel attack detection tool for tracking prime-probe[C]∥Proc of 2018 IEEE/ACM International Conference on Computer-Aided Design,2018:1-8.
|
[39] |
Bazm M-M,Sautereau T,Lacoste M,et al.Cache-based side-channel attacks detection through Intel cache monitoring technology and hardware performance counters[C]∥Proc of 2018 3rd International Conference on Fog and Mobile Edge Computing,2018:7-12.
|
[40] |
Wang Z, Taram M,Moghimi D,et al.NVLeak:Off-chip side-channel attacks via non-volatile memory systems[C]∥Proc of the 32nd USENIX Security Symposium,2023:6771-6788.
|
[41] |
Cook J,Drean J,Behrens J,et al.There’s always a bigger fish:A clarifying analysis of a machine-learning-assisted side-channel attack[C]∥Proc of the 49th Annual International Symposium on Computer Architecture,2022:204-217.
|