ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1711.08002
  4. Cited By
MemJam: A False Dependency Attack against Constant-Time Crypto
  Implementations

MemJam: A False Dependency Attack against Constant-Time Crypto Implementations

21 November 2017
A. Moghimi
T. Eisenbarth
B. Sunar
ArXivPDFHTML

Papers citing "MemJam: A False Dependency Attack against Constant-Time Crypto Implementations"

10 / 10 papers shown
Title
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
55
0
0
05 Sep 2024
CacheShield: Protecting Legacy Processes Against Cache Attacks
CacheShield: Protecting Legacy Processes Against Cache Attacks
Samira Briongos
Gorka Irazoqui Apecechea
Pedro Malagón
T. Eisenbarth
28
13
0
06 Sep 2017
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection
  Tool for Crypto Libraries
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
Gorka Irazoqui Apecechea
Kai Cong
Xiaofei Guo
Hareesh Khattri
A. Kanuparthi
T. Eisenbarth
B. Sunar
25
16
0
05 Sep 2017
CacheZoom: How SGX Amplifies The Power of Cache Attacks
CacheZoom: How SGX Amplifies The Power of Cache Attacks
A. Moghimi
Gorka Irazoqui Apecechea
T. Eisenbarth
46
333
0
20 Mar 2017
Ozone: Efficient Execution with Zero Timing Leakage for Modern
  Microarchitectures
Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures
Zelalem Birhanu Aweke
T. Austin
32
11
0
10 Mar 2017
Software Grand Exposure: SGX Cache Attacks Are Practical
Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
87
609
0
24 Feb 2017
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch
  Shadowing
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
43
506
0
21 Nov 2016
A software approach to defeating side channels in last-level caches
A software approach to defeating side channels in last-level caches
Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
44
695
0
17 Mar 2016
Rigorous Analysis of Software Countermeasures against Cache Attacks
Rigorous Analysis of Software Countermeasures against Cache Attacks
Goran Doychev
Boris Köpf
28
75
0
07 Mar 2016
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
75
579
0
14 Nov 2015
1