side-channel attacks (SCA)
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip
17
Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters
12
Unified isolation architectures and mechanisms against side channel attacks for decentralized cloud infrastructures
138
WHISPER A Tool for Run-time Detection of Side-Channel Attacks
31
Automated Software Protection for the Masses Against Side-Channel Attacks
26
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
11
Detection of Side Channel Attacks Based on Data Tainting in Android Systems
15
Soft Analytical Side-Channel Attacks
16
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
16
Side Channel Attacks against Pairing over Theta Functions
15
FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks
19
Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks
7
High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs
9
Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios
17
Remote Side-Channel Attacks on Heterogeneous SoC
17
Optimization methods for side channel attacks
223
Improving side-channel attacks against pairing-based cryptography
18
Codes for Side-Channel Attacks and Protections
25
Multivariate multitarget high order side-channel attacks
229
Enhancing Dimensionality Reduction Methods for Side-Channel Attacks
21