Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.9096
A survey of pipelined workflow scheduling, ACM Computing Surveys, vol.45, issue.4, pp.1-5036, 2013. ,
DOI : 10.1145/2501654.2501664
URL : https://hal.archives-ouvertes.fr/hal-00521712
Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015. ,
DOI : 10.1016/j.tcs.2015.07.034
URL : https://hal.archives-ouvertes.fr/hal-01088193
QUAIL: A Quantitative Security Analyzer for Imperative Code, LNCS, vol.8044, pp.702-707, 2013. ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
LeakWatch: Estimating Information Leakage from Java Programs, ESORICS, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Intel sgx explained, IACR ePrint Archive, p.86, 2016. ,
Bounds for certain multiprocessing anomalies. The Bell System Technical Journal, pp.1563-1581, 1966. ,
DOI : 10.1002/j.1538-7305.1966.tb01709.x
Flush+Flush: A Fast and Stealthy Cache Attack, DIMVA, pp.279-299, 2016. ,
DOI : 10.1145/2508859.2516741
URL : http://arxiv.org/abs/1511.04594
Cache template attacks: Automating attacks on inclusive last-level caches, Usenix Security, pp.897-912, 2015. ,
Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010. ,
DOI : 10.1145/1920261.1920300
Resource-Parameterized Timing Analysis of Real-Time Systems, In HVC, pp.190-205, 2015. ,
DOI : 10.1007/978-3-319-26287-1_12
Optimizing the resource requirements of hierarchical scheduling systems, ACM SIGBED Review, vol.13, issue.3, pp.41-48, 2016. ,
DOI : 10.1109/ECRTS.2008.28
URL : https://hal.archives-ouvertes.fr/hal-01406459
Real-Time Systems Security through Scheduler Constraints, 2014 26th Euromicro Conference on Real-Time Systems, pp.129-140, 2014. ,
DOI : 10.1109/ECRTS.2014.28
Cache Attacks and Countermeasures: The Case of AES, Cryptographers Track at the RSA Conference, pp.1-20, 2006. ,
DOI : 10.1007/11605805_1
A generalized model for preventing information leakage in hard real-time systems, 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015. ,
DOI : 10.1109/RTAS.2015.7108450
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653687
Malware guard extension: Using sgx to conceal cache attacks. arXiv preprint, 2017. ,
DOI : 10.1007/978-3-319-60876-1_1
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems, In IASTED, pp.13-18, 2006. ,
Integrating security and real-time requirements using covert channel capacity, IEEE Transactions on Knowledge and Data Engineering, vol.12, issue.6, pp.865-879, 2000. ,
DOI : 10.1109/69.895799
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.2362
Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010. ,
DOI : 10.1007/978-3-540-45238-6_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984
Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016. ,
DOI : 10.1109/EuroSP.2016.15
Scheduler-based defenses against cross-vm side-channels, Usenix Security, pp.687-702, 2014. ,
FLUSH+RELOAD: A high resolution, low noise, L3 cache sidechannel attack, USENIX Security, pp.719-732, 2014. ,
TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.1-12, 2016. ,
DOI : 10.1109/RTAS.2016.7461362