咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 2 篇 computer micro-a...
  • 1 篇 attack detection
  • 1 篇 conflict-based c...
  • 1 篇 cache side-chann...
  • 1 篇 eviction set con...
  • 1 篇 cache randomizat...
  • 1 篇 cache architectu...

机构

  • 2 篇 univ chinese aca...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 penn state univ ...

作者

  • 2 篇 xue zihan
  • 2 篇 song wei
  • 2 篇 li zhenzhen
  • 1 篇 han jinchi
  • 1 篇 liu peng

语言

  • 2 篇 英文
检索条件"主题词=Computer micro-architecture"
2 条 记 录,以下是1-10 订阅
排序:
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks
收藏 引用
IEEE TRANSACTIONS ON computerS 2024年 第4期73卷 1019-1033页
作者: Song, Wei Xue, Zihan Han, Jinchi Li, Zhenzhen Liu, Peng Chinese Acad Sci Inst Informat Engn Key Lab Cyberspace Secur Def Beijing 100085 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Penn State Univ University Pk PA 16801 USA
Conflict-based cache side-channel attacks against the last-level cache (LLC) is a widely exploited method for information leaking. Cache randomization has recently been accepted as a promising defense. Most of recent ... 详细信息
来源: 评论
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets  26th
Feasibility Analysis and Performance Optimization of the Con...
收藏 引用
26th International Conference on Information Security and Cryptology (ICISC)
作者: Li, Zhenzhen Xue, Zihan Song, Wei Chinese Acad Sci Key Lab Cyberspace Secur Def Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Cache side-channel attacks have been widely utilized as an intermediate step in some comprehensive attacks. Eviction sets, especially the minimal eviction sets, are essential components of the conflict-based cache sid... 详细信息
来源: 评论