References
- Amazon EC2.
- Microsoft Azure.
- Rackspace.
- Tromer E, Osvik D A, Shamir A., "Efficient Cache Attacks on AES, and Countermeasures[J]," Journal of Cryptology, 23(1):37-71, 2010. https://doi.org/10.1007/s00145-009-9049-y
- Bernstein D J., "Cache-timing attacks on AES[J]," Vlsi Design IEEE Computer Society, 51(2):218-221, 2005.
- Irazoqui G, Eisenbarth T, Sunar B, "S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES[C]," in Proc. of IEEE Symposium on Security & Privacy. IEEE, p. 591-604, 2015.
- Yarom Y, Falkner K, "Flush+Reload: a high resolution, low noise, L3 cache side-channel attack[C]," in Proc. of 23rd USENIX Security Symposium (USENIX Security 14), p.719-732, 2014.
- Liu F, Yarom Y, Ge Q, Heiser G, Lee R B, "Last-level cache side-channel attacks are practical[C]," in Proc. of IEEE Symposium on Security and Privacy, p. 605-622, 2015.
- Wang Z, Lee R B, "A novel cache architecture with enhanced performance and security[C]," in Proc. of 2008 41st IEEE/ACM International Symposium on Microarchitecture. IEEE, p. 83-93, 2008.
- Wang Z, Lee R B, "New cache designs for thwarting software cache-based side channel attacks[J]," ACM Sigarch Computer Architecture News, 35(2):494-505, 2007. https://doi.org/10.1145/1273440.1250723
- Zhang Y, Reiter M K, "Duppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud[C]," in Proc. of ACM Sigsac Conference on Computer & Communications Security. p. 827-838, 2013.
- Kim, Taesoo, Peinado, Marcus, Mainar-Ruiz, Gloria, "STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud[C]," in Proc. of USENIX Conference on Security Symposium. USENIX Association, p. 352-353, 2012.
- Carlet C, Guilley S, "Complementary Dual Codes for Counter-Measures to Side-Channel Attacks[M]," Coding Theory and Applications. Springer International Publishing, 97-105, 2015.
- Blomer J, Guajardo J, Krummel V, "Provably Secure Masking of AES[C]," in Proc. of International Conference on Selected Areas in Cryptography. Springer-Verlag, p. 69-83, 2004.
- Crane S, Homescu A, Brunthaler S, et al, "Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity[C]," in Proc. of NDSS Symposium, 2015.
- Vattikonda B C, Das S, Shacham H, "Eliminating fine grained timers in Xen[C]," in Proc. of ACM Workshop on Cloud Computing Security Workshop. ACM, p. 41-46, 2011.
- Varadarajan V, Ristenpart T, Swift M, "Scheduler-based defenses against cross-VM side-channels[C]," in Proc. of USENIX Conference on Security Symposium. USENIX Association, 2014.
- Shi J, Song X, Chen H, et al, "Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring[C]," in Proc. of IEEE/IFIP, International Conference on Dependable Systems and Networks Workshops. IEEE Computer Society, p. 194-199, 2011.
- Raj H, Nathuji R, Singh A, et al, "Resource management for isolation enhanced cloud services.[C]," in Proc. of ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, Il, USA, p. 77-84, 2009.
- Li P, Gao D, Reiter M K, "StopWatch: A Cloud Architecture for Timing Channel Mitigation[J]," ACM Transactions on Information & System Security, 17(2):1-28, 2014.
- Hu W M, "Lattice Scheduling and Covert Channels[C]," in Proc. of Research in Security and Privacy, 1992. Proceedings. 1992 IEEE Computer Society Symposium on. IEEE Xplore, p. 52-61, 1992.
- Kong J, Aciicmez O, Seifert J P, et al, "Hardware-software integrated approaches to defend against software cache-based side channel attacks[J]," p. 393-404, 2009.
- Blomer J, Krummel V, "Analysis of Countermeasures Against Access Driven Cache Attacks on AES[M]," Selected Areas in Cryptography. Springer Berlin Heidelberg, p. 96-109, 2007.
- Moon S J, Sekar V, Reiter M K, "Nomad:Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration[C]," p. 1595-1606, 2015.
- Payer M, "HexPADS: A Platform to Detect "Stealth" Attacks[M]," Engineering Secure Software and Systems. 2016.
- Coppens B, Verbauwhede I, De Bosschere K, et al, "Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors[J]," 73(7):45-60, 2009.
- AIDA64.
- Xen Project.
- Newsome J, Song D, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[J]," Chinese Journal of Engineering Mathematics, 29(5):720-724, 2005.
- Ainapure, B. S., Shah, D., & Rao, A. A, "Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment," Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, Springer, Singapore, pp. 9-21, 2018.
- Anwar, S., Inayat, Z., Zolkipli, M. F., Zain, J. M., Gani, A., Anuar, N. B., ... & Chang, V, "Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A survey," Journal of Network and Computer Applications, vol. 93, p. 259-279, 2017 https://doi.org/10.1016/j.jnca.2017.06.001
- Disselkoen C, Kohlbrenner D, Porter L, et al, "Prime+ abort: A timer-free high-precision l3 cache attack using intel TSX[C]," in Proc. of 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, p. 51-67, 2017.
- Garcia C P, Brumley B B, "Constant-Time Callees with Variable-Time Callers[J]," IACR Cryptology ePrint Archive, 2016: 1195, 2016.
- Green M, Rodrigues-Lima L, Zankl A, et al, "AutoLock: Why Cache Attacks on ARM Are Harder Than You Think[C]," in Proc. of 26th USENIX Security Symposium, 2017.
- Schwarz M, Lipp M, Gruss D, et al, "KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks[C]," NDSS, 2018.
- Gruss D, Lettner J, Schuster F, et al, "Strong and efficient cache side-channel protection using hardware transactional memory[C]," in Proc. of USENIX Security Symposium, 2017.
- Meng W, Tischhauser E W, Wang Q, et al, Ieee Access, 6: 10179-10188, 2018. https://doi.org/10.1109/ACCESS.2018.2799854
- Lin Q, Yan H, Huang Z, et al, "An ID-based linearly homomorphic signature scheme and its application in blockchain[J]," IEEE Access, 6: 20632-20640, 2018. https://doi.org/10.1109/ACCESS.2018.2809426
- Jiang F, Fu Y, Gupta B B, et al, "Deep Learning based Multi-channel intelligent attack detection for Data Security[J]," IEEE Transactions on Sustainable Computing, 2018.
- "Handbook of research on modern cryptographic solutions for computer and cyber security[M]," IGI Global, 2016.