РЕКОМЕНДУЕМЫЕ ПУБЛИКАЦИИ
1. Moritz Lipp, Daniel Gruss. ARMageddon: Cache Attacks on Mobile Devices // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 549-564.
2. Robert Callan. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events // 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Pages 242-254, December 2014.
3. Junrong Liu. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. BlackHat 2015.
4. Herbert Bos, Ben Gras. Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. 2017 // URL: http://www.cs.vu.nl/~herbertb/download/papers/revanc_ir-cs-77.pdf (дата обращения: 8 мая 2017).
5. Yu Cai, Saugata Ghose. Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques // 23rd IEEE Symposium on High Performance Computer Architecture, Industrial session, February 2017.
6. Yarom Yuval, Falkner Katrina. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack // Proceedings of the 23rd USENIX Security Symposium. 2014. pp. 719–732.
7. Gruss Daniel, Maurice Clementine M angard, Stefan. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript // In: arXiv:1507.06955v1 2016. URL: http://arxiv.org/abs/1507.06955 (дата обращения: 16 мая 2017)
8. Gruss Daniel, Maurice Clementine, Wagner Klaus. Flush+Flush : A Stealthier Last-Level Cache Attack // In: arXiv:1511.04594 abs/1511.0. 2015. URL: http://arxiv.org/abs/1511.04594 (дата обращения: 16 мая 2017).
9. Kim Yoongu, Daly Ross. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors // Proceeding of the 41st Annual International Symposium on Computer Architecuture. Piscataway, NJ, USA : IEEE Press, 2012 (ISCA ’14).
10. Eck Wim. Electromagnetic radiation from video display units: An eavesdropping risk? // Computers and Security. No. 4, 1985. pp. 269-286.
11. Biham Eli, Shamir Adi. Differential Fault Analysis of Secret Key Cryptosystem // Advances in Cryptology – CRYPTO ’97 Bd. 1294.
12. Callan Robert, Zajic Alenka. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events // Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture. 2014. pp. 242–254.
13. Genkin Daniel, Pachmanov Lev. ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs // Cryptology ePrint Archive, Report 2016/129.
14. Gruss Daniel, Spreitzer, Raphael. Cache template attacks: Automating attacks on inclusive last-level caches // Proceedings of the 24th USENIX Security Symposium. 2015. pp. 897–912.
15. Seaborn Mark. Exploiting the DRAM rowhammer bug to gain kernel privileges. 2015 // URL: http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html (дата обращения: 16 мая 2017).
16. Gruss Daniel. Rowhammer bitflips on Skylake with DDR4. 2016 // URL: https://twitter.com/lavados/status/685618703413698562 (дата обращения: 16 мая 2017).
17. Lanteigne Mark. How Rowhammer Could Be Used to Exploit Weakness Weaknesses in Computer Hardware. 2016 // URL: http://www.thirdio.com/rowhammer.pdf (дата обращения: 16 мая 2017).
18. Osvik Dag, Shamir Adi. Cache Attacks and Countermeasures: the Case of AES // Topics in Cryptology. 2005. pp. 1-20.
19. Tromer Eran, Osvik Dag. Efficient cache attacks on AES, and countermeasures // Journal of Cryptology 23(1), 2010. pp. 37-71.
20. Liu Fangfei, Yarom, Yuval. Last-level cache side-channel attacks are practical // Proceedings of the IEEE Symposium on Security and Privacy Bd. 2015. pp. 605-622.
21. Irazoqui Gorka, Eisenbarth Thomas. A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing – and its Application to AES // IEEE Symposium on Security and Privacy. 2015.
22. Gullasch David, Bangerter Endre. Cache games – Bringing access-based cache attacks on AES to practice // Proceedings of the IEEE Symposium on Security and Privacy. 2011. pp. 490-505.
23. Irazoqui Gorka, Inci Mehmet. Wait a minute! A fast, cross-VM attack on AES // Lecture Notes in Computer Science Bd. 2014. pp. 299-319.
24. Yarom Yuval, Benger Naomi. Recovering OpenSSL ECDSA Nonces Using the Flush+Reload Cache Side-channel Attack // Cryptology ePrint Archive, Report 2014/140 (2014).
25. Gulmezoglu Berk, Inci Mehmet. A Faster and More Realistic Flush+Reload Attack on AES // Proceedings of the 6th international workshop on Constructive Side-Channel Analysis and Secure Design. 2015. pp. 111-126.
26. Irazoqui Gorka, IncI Mehmet. Know Thy Neighbor: Crypto Library Detection in Cloud // Proceedings of the Privacy Enhancing Technologies. 2015. pp. 25–40.
27. Pessl Peter, Gruss Daniel. Reverse Engineering Intel DRAM Addressing and Exploitation. 2015 // URL: http://arxiv.org/abs/1511.08756 (дата обращения: 16 мая 2017).
28. Marforio Claudio, Ritzdorf Hubert. Analysis of the communication between colluding applications on modern smartphones // Proceedings of the 28th Annual Computer Security Applications Conference. 2012. pp. 51-60.
29. Clementine Maurice, Manuel Webe. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. 2017. // URL: https://www.internetsociety.org/doc/hello-other-side-ssh-over-robust-cache-covert-channels-cloud (дата обращения: 8 мая 2017)
30. Victor van der Veen, Lindorfer. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016. pp. 1675-1689.
31. Kaveh Razavi, Ben Gras. Flip Feng Shui: Hammering a Needle in the Software Stack // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 1-18.
32. Ramya Jayaram Masti, Devendra Rai. Thermal Covert Channels on Multi-core Platforms // Proceedings of the 24th USENIX Security Symposium. 2015. pp. 865-880.
33. Angelos Oikonomopoulos. Poking Holes in Information Hiding // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 121-138.
34. Koen Koning, Herbert Bos. No Need to Hide: Protecting Safe Regions on Commodity Hardware // Proceedings of the Twelfth European Conference on Computer Systems. 2017. pp. 437-452.
35. Erik Bosman, Kaveh Razavi. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector // Proceedings of the IEEE Symposium on Security and Privacy. 2016. pp. 987-1004.
36. Evtyushkin, D., Ponomarev, D. Jump over ASLR: Attacking branch predictors to bypass ASLR // Proceedings of the 49th International Symposium on Microarchitecture. 2016. pp. 1-13.
37. Daniel Gruss, Moritz Lipp. KASLR is Dead: Long Live KASLR. 2017 // URL: https://github.com/IAIK/KAISER (дата обращения: 8 мая 2017).
38. Eric Butler. The Secret Life of SIM Cards // DEFCON 21. 2013.
39. Charlie Miller. Battery Firmware Hacking // Black Hat. 2011.
40. Yan Michalevsky. Gyrophone: Recognizing Speech From Gyroscope Signals // Black Hat. 2014.
41. Yan Michalevsky (Stanford). PowerSpy: Location Tracking using Mobile Device Power Analysis // 24th USENIX Security Symposium. 2015. pp. 785-800.
42. Bruce Potter. Dirty Little Secrets of Information Security // DEFCON 15. 2007.
43. Dr. Richard J. Danzig. Inherent Cyber Insecurity and Our National Security: Surviving on a Diet of Poisoned Fruit // 24th USENIX Security Symposium. 2015.
44. Frank Konieczny. SEADE: Countering the Futility of Network Security // Air & Space Power Journal. 29(5), 2015. pp. 4-14.
45. Silke Holtmanns, Bhanu Kotte, Siddharth Rao. Detach me not DoS attacks against 4G cellular users worldwide from your desk // Black Hat. 2016.
46. Marina Bay Sands. 3G/4G Intranet Scanning and its Application on the WormHole Vulnerability // Black Hat. 2017.
47. Collin Mulliner. Probing Mobile Operator Networks // Black Hat. 2012.
48. Dave Blair. Any Time, Every Place: The Networked Societies of War Fighters in a Battlespace of Flows // Air & Space Power Journal. 29(5), 2015. pp. 15-30.
49. Nico Golde, Kévin Redon. Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks // 22nd USENIX Security Symposium. 2013. pp. 33-48.
50. Moritz Lipp, Daniel Gruss. ARMageddon: Cache Attacks on Mobile Devices // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 549-564.
51. Chris Babcock. Preparing for the Cyber Battleground of the Future // Air & Space Power Journal. 29(6), 2015. pp. 61-73.
