ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1709.01552
  4. Cited By
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection
  Tool for Crypto Libraries

Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries

5 September 2017
Gorka Irazoqui Apecechea
Kai Cong
Xiaofei Guo
Hareesh Khattri
A. Kanuparthi
T. Eisenbarth
B. Sunar
ArXiv (abs)PDFHTML

Papers citing "Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries"

8 / 8 papers shown
Microwalk-CI: Practical Side-Channel Analysis for JavaScript
  Applications
Microwalk-CI: Practical Side-Channel Analysis for JavaScript ApplicationsConference on Computer and Communications Security (CCS), 2022
Jan Wichelmann
Florian Sieck
Anna Pätschke
T. Eisenbarth
145
25
0
31 Aug 2022
Automated Side Channel Analysis of Media Software with Manifold Learning
Automated Side Channel Analysis of Media Software with Manifold Learning
Yuanyuan Yuan
Qi Pang
Shuai Wang
AAML
276
20
0
09 Dec 2021
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and
  Defenses in Cryptography
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in CryptographyACM Computing Surveys (CSUR), 2021
Xiaoxuan Lou
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
288
135
0
26 Mar 2021
CACHE SNIPER : Accurate timing control of cache evictions
CACHE SNIPER : Accurate timing control of cache evictions
Samira Briongos
Ida Bruhns
Pedro Malagón
T. Eisenbarth
Jose M. Moya
142
1
0
27 Aug 2020
Revisiting and Evaluating Software Side-channel Vulnerabilities and
  Countermeasures in Cryptographic Applications
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
162
0
0
21 Nov 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract
  Interpretation
Identifying Cache-Based Side Channels through Secret-Augmented Abstract InterpretationUSENIX Security Symposium (USENIX Security), 2019
Shuai Wang
Yuyan Bao
Xiao Liu
Pei Wang
Qiang Yan
Dinghao Wu
151
57
0
30 May 2019
MicroWalk: A Framework for Finding Side Channels in Binaries
MicroWalk: A Framework for Finding Side Channels in Binaries
Jan Wichelmann
A. Moghimi
T. Eisenbarth
B. Sunar
211
82
0
16 Aug 2018
MemJam: A False Dependency Attack against Constant-Time Crypto
  Implementations
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations
A. Moghimi
T. Eisenbarth
B. Sunar
164
86
0
21 Nov 2017
1
Page 1 of 1