[1]PERCIVAL C.Cache missing for fun and profit[EB/OL].[2017-10-10].http://www.daemonology.net/papers/htt.pdf.
[2]YAROM Y,FALKNER K.FLUSH+RELOAD:a high resolution,low noise,L3 cache side-channel attack[C]//Proceedings of USENIX Conference on Security Symposium.[S.l.]:USENIX Association,2014:719-732.
[3]赵新杰,王韬,郑媛媛.Camellia访问驱动Cache计时攻击研究[J].计算机学报,2010,33(7):1153-1164.
[4]GULLASCH D,BANGERTER E,KRENN S.Cache games-bringing access-based cache attacks on AES to practice[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2011:490-505.
[5]GULMEZOGLU B,INCI M,IRAZOKI G,et al.Cross-VM cache attacks on AES[J].IEEE Transactions on Multi-scale Computing Systems,2017,2(3):211-222.
[6]IRAZOQUI G,INCI M S,EISENBARTH T,et al.Wait a minute! a fast,cross-VM attack on AES[J].Lecture Notes in Computer Science,2014,8688:299-319.
[7]IRAZOQUI G,INCI M S,EISENBARTH T,et al.Know thy neighbor:crypto library detection in cloud[J].Proceedings on Privacy Enhancing Technologies,2015(1):25-40.
[8]GRUSS D,SPREITZER R,MANGARD S.Cache template attacks:automating attacks on inclusive last-level caches[C]//Proceedings of USENIX Conference on Security Symposium.[S.l.]:USENIX Association,2015:897-912.
[9]解双建,原亮,谢方方.DES算法原理及其FPGA实现[J].计算机技术与发展,2011,21(7):158-160.
[10]PAAR C,PELZL J.深入浅出密码学:常用加密技术原理与应用[M].马小婷,译.北京:清华大学出版社,2012.
[11]李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010.
[12]赵新杰,王韬,郭世泽,等.AES访问驱动Cache计时攻击[J].软件学报,2011,22(3):572-591.
[13]陈财森,王韬,郭世泽,等.针对RSA算法的踪迹驱动数据Cache计时攻击研究[J].计算机学报,2014,37(5):1039-1051.
[14]XUAN C,COPELAND J A,BEYAH R A,et al.Toward revealing kernel malware behavior in virtual execution environments[C]//Proceedings of International Symposium on Recent Advances in Intrusion Detection.Saint-Malo,France:[s.n.],2009:304-325.
[15]LIPP M,GRUSS D,SPREITZER R,et al.ARMageddon:last-level cache attacks on mobile devices[J].USENIX Security Symposium,2015,6(1):549-569. |