, Performance considerations, 2013.
, Application Note 176-How a GIC works, 2007.
, ARM Generic Interrupt Controller Architecture version 2.0, 2013.
Smart phone use by non-mobile business users, Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011. ,
The parsec benchmark suite: Characterization and architectural implications, Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, 2008. ,
Understanding the Linux Kernel, 2005. ,
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion, USENIX Workshop on Hot Topics in Security-HotSec, 2011. ,
, Consumer Survey: Password Habits, 2012.
The tangled web of password reuse, NDSS'14, 2014. ,
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis, S&P'16, 2016. ,
Password management strategies for online accounts, SOUPS'06, 2006. ,
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware, Journal of Cryptographic Engineering, pp.1-27, 2016. ,
Samsung galaxy s7 battery life review, 2016. ,
Android o prevents access to /proc/stat, 2017. ,
Strong and efficient cache side-channel protection using hardware transactional memory, USENIX Security Symposium, 2017. ,
Flush+Flush: A Fast and Stealthy Cache Attack, 2016. ,
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches, USENIX Security Symposium, 2015. ,
Cache Games-Bringing Access-Based Cache Attacks on AES to Practice, S&P'11, 2011. ,
, Soft Biometrics for Keystroke Dynamics: Profiling Individuals While Typing Passwords, vol.45, pp.147-155, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011801
Cache Attacks Enable Bulk Key Recovery on the Cloud, CHES'16, 2016. ,
82093AA I/O Advanced Programmable Interrupt Controller (IOAPIC), 1996. ,
, Intel R 64 and IA-32 Architectures Software Developer s Manual, vol.3, 2014.
Memento: Learning Secrets from Process Footprints, S&P'12, 2012. ,
DOI : 10.1109/sp.2012.19
URL : http://www.cs.utexas.edu/%7Eshmat/shmat_oak12memento.pdf
Breaking Kernel Address Space Layout Randomization with Intel TSX, CCS'16, 2016. ,
DOI : 10.1145/2976749.2978321
Honey, i shrunk the attack surface, 2017. ,
Global app power consumption report 2016, h1, 2016. ,
The Influence of Emotion on Keyboard Typing: An Experimental Study Using Auditory Stimuli, PLOS ONE, vol.10, pp.1-16, 2015. ,
, Linux man-pages project, 2016.
Practical keystroke timing attacks in sandboxed javascript, ESORICS'17, 2017. ,
ARMageddon: Cache Attacks on Mobile Devices, USENIX Security Symposium, 2016. ,
Last-Level Cache Side-Channel Attacks are Practical, S&P'15, 2015. ,
DOI : 10.1109/sp.2015.43
The high-resolution timer API, 2006. ,
A study of probabilistic password models, S&P'14, 2014. ,
Reverse Engineering Intel Complex Addressing Using Performance Counters, RAID'15, 2015. ,
DOI : 10.1007/978-3-319-26362-5_3
lmbench: Portable tools for performance analysis, USENIX ATC'96, 1996. ,
, Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks, 2016.
Acpi system description tables, 2016. ,
Fast dictionary attacks on passwords using time-space tradeoff, CCS'05, 2005. ,
DOI : 10.1145/1102120.1102168
English letter frequency counts: Mayzner revisited, 2013. ,
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications, CCS'15, 2015. ,
Cache Attacks and Countermeasures: the Case of AES, 2006. ,
Cache missing for fun and profit, Proceedings of BSDCan, 2005. ,
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks, USENIX Security Symposium, 2016. ,
Typing is writing: Linguistic properties modulate typing execution, Psychon Bull Rev, vol.23, issue.6, pp.1898-1906, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01477291
Snapdragon mobile processors and chipsets, 2017. ,
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, CCS'09, 2009. ,
Encountering stronger password requirements: User attitudes and behaviors, SOUPS'10, 2010. ,
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise, 2016. ,
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards, Proceedings on Privacy Enhancing Technologies, 2016. ,
Timing Analysis of Keystrokes and Timing Attacks on SSH, USENIX Security Symposium, 2001. ,
GTK+ Features, 2016. ,
On semantic patterns of passwords and their security impact, NDSS'14, 2014. ,
Loophole: Timing attacks on shared event loops in chrome, USENIX Security Symposium, 2017. ,
Understanding password choices: How frequently entered passwords are re-used across websites, SOUPS'16, 2016. ,
Password cracking using probabilistic context-free grammars, S&P'09, 2009. ,
Mobile touches: a study on humans and their tech, 2016. ,
xorg documentation, 2014. ,
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, USENIX Security Symposium, 2014. ,
Mapping the Intel Last-Level Cache, Cryptology ePrint Archive, pp.1-12, 2015. ,
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems, USENIX Security Symposium, 2009. ,