Side-channels beyond the cloud edge: New isolation threats and solutions, 2017 1st Cyber Security in Networking Conference (CSNet), 2017. ,
DOI : 10.1109/CSNET.2017.8241986
URL : https://hal.archives-ouvertes.fr/hal-01593144
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, 2015 IEEE Symposium on Security and Privacy, pp.591-604, 2015. ,
DOI : 10.1109/SP.2015.42
Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014. ,
Real time detection of cache-based side-channel attacks using hardware performance counters, Applied Soft Computing, vol.49, pp.1162-1174, 2016. ,
DOI : 10.1016/j.asoc.2016.09.014
CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.118-140, 2016. ,
DOI : 10.1145/2508859.2516741
HexPADS: A Platform to Detect ???Stealth??? Attacks, International Symposium on Engineering Secure Software and Systems, pp.138-154, 2016. ,
DOI : 10.1145/2508859.2516741
Pattern classification, 2012. ,
The architecture of the nehalem processor and nehalem-ep smp platforms, Resource, vol.3, issue.2, 2011. ,
Trace-Driven Cache Attacks on AES (Short Paper), International Conference on Information and Communications Security, pp.112-121, 2006. ,
DOI : 10.1007/11935308_9
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, International Workshop on Information Security Applications, pp.243-257, 2010. ,
DOI : 10.1007/978-3-540-28632-5_12
Flush+Flush: A Fast and Stealthy Cache Attack, 2015. ,
DOI : 10.1145/2508859.2516741
Exploiting the dram rowhammer bug to gain kernel privileges, 2015. ,
Flush+Flush: A Fast and Stealthy Cache Attack, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.279-299, 2016. ,
DOI : 10.1145/2508859.2516741
Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation, 2011. ,