中文版 | English
访问统计
月访问量

0

  • 内部: 0

  • 外部: 0

  • 国内: 0

  • 国外: 0

年访问量

0

  • 内部: 0

  • 外部: 0

  • 国内: 0

  • 国外: 0

总访问量

7

  • 内部: 0

  • 外部: 7

  • 国内: 6

  • 国外: 1

访问量
访问量
1. TLB Poisoning Attacks on AMD Secure Encrypted Virtualization [22]
2. Cape: Compiler-Aided Program Transformation forHTM-Based Cache Sid.. [17]
3. Narrator: Secure and Practical State Continuity for Trusted Execut.. [15]
4. Multi-Certificate Attacks against Proof-of-Elapsed-Time And Their .. [15]
5. SPECBOX: A Label-Based Transparent Speculation Scheme Against Tran.. [12]
6. Dancing with Wolves: An Intra-process Isolation Technique with Pri.. [11]
7. A Survey of Microarchitectural Side-channel Vulnerabilities, Attac.. [9]
8. CIPHERLEAKS: Breaking constant-time cryptography on AMD SEV via th.. [9]
9. Specularizer : Detecting Speculative Execution Attacks via Perform.. [5]
10. CrossLine: Breaking "security-by-Crash" based Memory Isolation in .. [5]
11. Panda: Security Analysis of Algorand Smart Contracts [5]
12. Towards formal verification of state continuity for enclave progra.. [4]
13. A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP [4]
14. INTROSPECTRE: A pre-silicon framework for discovery and analysis o.. [3]
15. Defeating traffic analysis via differential privacy: a case study .. [3]
16. SoK: Understanding Designs Choices and Pitfalls of Trusted Executi.. [3]
17. Securing TEEs With Verifiable Execution Contracts [2]
18. vSGX: Virtualizing SGX Enclaves on AMD SEV [2]
19. ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX [2]
20. SvTPM: SGX-based Virtual Trusted Platform Modules for Cloud Comput.. [2]
21. 一种检测侧信道漏洞的方法和装置 [2]
22. VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection [2]
23. SpecWands: An Efficient Priority-based Scheduler Against Speculati.. [2]
24. TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution .. [2]
25. PANIC: PAN-assisted Intra-process Memory Isolation on ARM [2]
26. Ensuring State Continuity for Confidential Computing: A Blockchain.. [2]
27. SAEG: Stateful Automatic Exploit Generation [2]
28. ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes [1]
29. PwrLeak: Exploiting Power Reporting Interface for Side-Channel At.. [1]
30. Controlled Data Races in Enclaves: Attacks and Detection [1]
31. CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabil.. [1]
32. Uncovering and Exploiting AMD Speculative Memory Access Predictors.. [1]
33. ReminISCence: Trusted Monitoring Against Privileged Preemption Sid.. [1]
下载量