[1] Aciicmez O. Yet Another MicroArchitectural Attack: Exploiting I-cache[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA: ACM Press, 2007. [2] Aciicmez O, Schindler W. A Major Vulnerability in RSA Imple- mentations Due to Microarchitectural Analysis Threat[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA: ACM Press, 2007. [3] Percival C. Cache Missing for Fun and Profit[C]//Proceedings of BSDCan 2005. Ottawa, Canada: [s. n.], 2005. [4] 赵新杰, 王 韬, 矫文成. 一种新的针对AES的访问驱动Cache攻击[J]. 小型微型计算机系统, 2009, 30(4): 797-800. [5] 赵新杰, 王 韬, 郑媛媛. Camellia访问驱动Cache计时攻击研究[J]. 计算机学报, 2010, 33(7): 1153-1164. [6] 陈财森, 王 韬, 陈建泗, 等. 基于Cache Missing的RSA计时攻击[J]. 微电子学与计算机, 2009, 26(5): 180-183. [7] OpenSSL: The Open-source Toolkit for SSL/TLS[EB/OL]. (2005- 12-22). http://www.openssl.org/. [8] 陈财森, 王 韬, 郑媛媛, 等. RSA公钥密码算法的计时攻击和防御研究[J]. 计算机工程, 2009, 35(2): 123-125. [9] Stallings W. 计算机组织与体系结构性能设计[M]. 张昆藏, 施一萍, 经致远, 等, 译. 北京: 清华大学出版社, 2006. [10] Intel Co.. Using the RDSTC Instruction for Performance Monitoring[Z]. 1997. [11] Gael H, Koeune F, Quisquater J. Timing Attack: What Can be Achieved by a Powerful Adversary?[D]. London, UK: UCL Crypto Group, University College London, 2000.
|