Trace-driven cache attacks on aes (short paper), Information and Communications Security, pp.112-121, 2006. ,
Program obfuscation: a quantitative approach, Proceedings of the 2007 ACM workshop on Quality of protection, pp.15-20, 2007. ,
Incomplete information. Handbook of game theory with economic applications 3, pp.1665-1686, 2002. ,
Cache-Collision Timing Attacks Against AES, Cryptographic Hardware and Embedded Systems-CHES 2006, pp.201-215, 2006. ,
DOI : 10.1007/11894063_16
Cache-timing template attacks, Advances in Cryptology? ASIACRYPT 2009, pp.667-684, 2009. ,
Remote timing attacks are still practical, Computer Security? ESORICS 2011, pp.355-371, 2011. ,
Twin clouds: Secure cloud computing with low latency, Communications and Multimedia Security, pp.32-44, 2011. ,
Longest common subsequences of two random sequences, Journal of Applied Probability, pp.306-315, 1975. ,
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009. ,
A taxonomy of obfuscating transformations, 1997. ,
Secure virtual architecture: A safe execution environment for commodity operating systems, In ACM SIGOPS Operating Systems Review, vol.41, pp.351-366, 2007. ,
Rsa key extraction via low-bandwidth acoustic cryptanalysis, Cryptology ePrint Archive, 2013. ,
Non-interactive verifiable computing: Outsourcing computation to untrusted workers, Advances in Cryptology?CRYPTO 2010, pp.465-482, 2010. ,
Implementing gentrys fully-homomorphic encryption scheme, Advances in Cryptology?EUROCRYPT 2011, pp.129-148, 2011. ,
Cache games?bringing access-based cache attacks on aes to practice, Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, pp.490-505, 2011. ,
Cloud protection by obfuscation: Techniques and metrics, P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2012 Seventh International Conference on. IEEE, pp.369-372, 2012. ,
Ojit: A novel secure remote execution technology by obfuscated just-in-time compilation, European LLVM Conf, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00909766
Information theory-based software metrics and obfuscation, Journal of Systems and Software, vol.72, issue.2, pp.179-186, 2004. ,
Differential power analysis, Advances in Cryptology- CRYPTO99, pp.388-397, 1999. ,
A box, darkly: Obfuscation, weird languages, and code aesthetics, Proceedings of the 6th Digital Arts and Culture Conference, pp.144-153, 2005. ,
Trustvisor: Efficient tcb reduction and attestation, Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, pp.143-158, 2010. ,
http://theory.stanford, 2014. ,
Advances on access-driven cache attacks on aes, Selected Areas in Cryptography, pp.147-162, 2007. ,
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009. ,
Winnowing: local algorithms for document fingerprinting, Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp.76-85, 2003. ,
Impeding malware analysis using conditional code obfuscation, NDSS, 2008. ,
Fully homomorphic encryption with relatively small key and ciphertext sizes, Public Key Cryptography?PKC 2010, pp.420-443, 2010. ,
All your clouds are belong to us, STANDARD PERFORMANCE EVALUATION CORPORATION. SPEC Benchmarks, 2011. ,
Malware obfuscation techniques: A brief survey, BWCCA, pp.297-300, 2010. ,
Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012. ,
Offset From GEP Pass 54 Lower Aggr. Copies Pass 55 Allocation Hoisting 56 Global Base Register Pass 57 Cleanup Local Dynamic TLS Pass Table I: List of used transformations ,