On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner. On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks. In Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin, editors, NETWORKING 2012 - 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I. Volume 7289 of Lecture Notes in Computer Science, pages 135-148, Springer, 2012. [doi]

Abstract

Abstract is missing.