Abstract is missing.
- An algorithm for detecting contention-based covert timing channels on shared hardwareJie Chen 0020, Guru Venkataramani. 1 [doi]
- Constructing timing-based covert channels in mobile networks by adjusting CPU frequencyMengchao Yue, William H. Robinson, Lanier Watkins, Cherita L. Corbett. 2 [doi]
- Morpheus: benchmarking computational diversity in mobile malwareMikhail Kazdagli, Ling Huang, Vijay Reddi, Mohit Tiwari. 3 [doi]
- The role of the fault model in DFA against AESClaudio Ferretti, Silvia Mella, Filippo Melzani. 4 [doi]
- Seasoning effect based side channel attacks to AES implementation with phase change memoryLei Xu, Weidong Shi, Nicholas Desalvo. 5 [doi]
- Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasuresTaoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, Maël Berthier, Yves Bocktaels, Mélanie Favre, Hervé Chabanne. 6 [doi]
- Side-channel leakage and trace compression using normalized inter-class varianceShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. 7 [doi]
- PUMP: a programmable unit for metadata processingUdit Dhawan, Nikos Vasilakis, Raphael Rubin, Silviu Chiricescu, Jonathan M. Smith, Thomas F. Knight Jr., Benjamin C. Pierce, André DeHon. 8 [doi]
- Towards fast hardware memory integrity checking with skewed Merkle treesJakub Szefer, Sebastian Biedermann. 9 [doi]
- Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)Tushar Swamy, Neel Shah, Pei Luo, Yunsi Fei, David Kaeli. 10 [doi]
- Memory bandwidth reservation in the cloud to avoid information leakage in the memory controllerAkhila Gundu, Gita Sreekumar, Ali Shafiee, Seth H. Pugsley, Hardik Jain, Rajeev Balasubramonian, Mohit Tiwari. 11 [doi]