Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Preventing page faults from telling your secrets
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
Cacheaudit: A tool for the static analysis of cache side channels
We present CacheAudit, a versatile framework for the automatic, static analysis of cache
side channels. CacheAudit takes as input a program binary and a cache configuration and …
side channels. CacheAudit takes as input a program binary and a cache configuration and …
Eliminating timing side-channel leaks using program repair
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …
side channels in software code that implements security-critical applications. Our method …
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of
events is wrapped by a timing mitigator that delays output events so that they contain only a …
events is wrapped by a timing mitigator that delays output events so that they contain only a …
Automatic quantification of cache side-channels
The latency gap between caches and main memory has been successfully exploited for
recovering sensitive input to programs, such as cryptographic keys from implementation of …
recovering sensitive input to programs, such as cryptographic keys from implementation of …
Predictive mitigation of timing channels in interactive systems
Timing channels remain a difficult and important problem for information security. Recent
work introduced predictive mitigation, a new way to mitigating leakage through timing …
work introduced predictive mitigation, a new way to mitigating leakage through timing …
Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's
address pattern to an untrusted storage system. More recently, ORAM schemes have been …
address pattern to an untrusted storage system. More recently, ORAM schemes have been …
Additive and multiplicative notions of leakage, and their capacities
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
Information-theoretic bounds for differentially private mechanisms
There are two active and independent lines of research that aim at quantifying the amount of
information that is disclosed by computing on confidential data. Each line of research has …
information that is disclosed by computing on confidential data. Each line of research has …
A study on power side channels on mobile devices
Power side channel is a very important category of side channels, which can be exploited to
steal confidential information from a computing system by analyzing its power consumption …
steal confidential information from a computing system by analyzing its power consumption …