РЕКОМЕНДУЕМЫЕ ПУБЛИКАЦИИ 1. Moritz Lipp, Daniel Gruss. ARMageddon: Cache Attacks on Mobile Devices // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 549-564. 2. Robert Callan. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events // 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Pages 242-254, December 2014. 3. Junrong Liu. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. BlackHat 2015. 4. Herbert Bos, Ben Gras. Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. 2017 // URL: http://www.cs.vu.nl/~herbertb/download/papers/revanc_ir-cs-77.pdf (дата обращения: 8 мая 2017). 5. Yu Cai, Saugata Ghose. Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques // 23rd IEEE Symposium on High Performance Computer Architecture, Industrial session, February 2017. 6. Yarom Yuval, Falkner Katrina. Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack // Proceedings of the 23rd USENIX Security Symposium. 2014. pp. 719–732. 7. Gruss Daniel, Maurice Clementine M angard, Stefan. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript // In: arXiv:1507.06955v1 2016. URL: http://arxiv.org/abs/1507.06955 (дата обращения: 16 мая 2017) 8. Gruss Daniel, Maurice Clementine, Wagner Klaus. Flush+Flush : A Stealthier Last-Level Cache Attack // In: arXiv:1511.04594 abs/1511.0. 2015. URL: http://arxiv.org/abs/1511.04594 (дата обращения: 16 мая 2017). 9. Kim Yoongu, Daly Ross. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors // Proceeding of the 41st Annual International Symposium on Computer Architecuture. Piscataway, NJ, USA : IEEE Press, 2012 (ISCA ’14). 10. Eck Wim. Electromagnetic radiation from video display units: An eavesdropping risk? // Computers and Security. No. 4, 1985. pp. 269-286. 11. Biham Eli, Shamir Adi. Differential Fault Analysis of Secret Key Cryptosystem // Advances in Cryptology – CRYPTO ’97 Bd. 1294. 12. Callan Robert, Zajic Alenka. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events // Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture. 2014. pp. 242–254. 13. Genkin Daniel, Pachmanov Lev. ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs // Cryptology ePrint Archive, Report 2016/129. 14. Gruss Daniel, Spreitzer, Raphael. Cache template attacks: Automating attacks on inclusive last-level caches // Proceedings of the 24th USENIX Security Symposium. 2015. pp. 897–912. 15. Seaborn Mark. Exploiting the DRAM rowhammer bug to gain kernel privileges. 2015 // URL: http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html (дата обращения: 16 мая 2017). 16. Gruss Daniel. Rowhammer bitflips on Skylake with DDR4. 2016 // URL: https://twitter.com/lavados/status/685618703413698562 (дата обращения: 16 мая 2017). 17. Lanteigne Mark. How Rowhammer Could Be Used to Exploit Weakness Weaknesses in Computer Hardware. 2016 // URL: http://www.thirdio.com/rowhammer.pdf (дата обращения: 16 мая 2017). 18. Osvik Dag, Shamir Adi. Cache Attacks and Countermeasures: the Case of AES // Topics in Cryptology. 2005. pp. 1-20. 19. Tromer Eran, Osvik Dag. Efficient cache attacks on AES, and countermeasures // Journal of Cryptology 23(1), 2010. pp. 37-71. 20. Liu Fangfei, Yarom, Yuval. Last-level cache side-channel attacks are practical // Proceedings of the IEEE Symposium on Security and Privacy Bd. 2015. pp. 605-622. 21. Irazoqui Gorka, Eisenbarth Thomas. A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing – and its Application to AES // IEEE Symposium on Security and Privacy. 2015. 22. Gullasch David, Bangerter Endre. Cache games – Bringing access-based cache attacks on AES to practice // Proceedings of the IEEE Symposium on Security and Privacy. 2011. pp. 490-505. 23. Irazoqui Gorka, Inci Mehmet. Wait a minute! A fast, cross-VM attack on AES // Lecture Notes in Computer Science Bd. 2014. pp. 299-319. 24. Yarom Yuval, Benger Naomi. Recovering OpenSSL ECDSA Nonces Using the Flush+Reload Cache Side-channel Attack // Cryptology ePrint Archive, Report 2014/140 (2014). 25. Gulmezoglu Berk, Inci Mehmet. A Faster and More Realistic Flush+Reload Attack on AES // Proceedings of the 6th international workshop on Constructive Side-Channel Analysis and Secure Design. 2015. pp. 111-126. 26. Irazoqui Gorka, IncI Mehmet. Know Thy Neighbor: Crypto Library Detection in Cloud // Proceedings of the Privacy Enhancing Technologies. 2015. pp. 25–40. 27. Pessl Peter, Gruss Daniel. Reverse Engineering Intel DRAM Addressing and Exploitation. 2015 // URL: http://arxiv.org/abs/1511.08756 (дата обращения: 16 мая 2017). 28. Marforio Claudio, Ritzdorf Hubert. Analysis of the communication between colluding applications on modern smartphones // Proceedings of the 28th Annual Computer Security Applications Conference. 2012. pp. 51-60. 29. Clementine Maurice, Manuel Webe. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. 2017. // URL: https://www.internetsociety.org/doc/hello-other-side-ssh-over-robust-cache-covert-channels-cloud (дата обращения: 8 мая 2017) 30. Victor van der Veen, Lindorfer. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016. pp. 1675-1689. 31. Kaveh Razavi, Ben Gras. Flip Feng Shui: Hammering a Needle in the Software Stack // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 1-18. 32. Ramya Jayaram Masti, Devendra Rai. Thermal Covert Channels on Multi-core Platforms // Proceedings of the 24th USENIX Security Symposium. 2015. pp. 865-880. 33. Angelos Oikonomopoulos. Poking Holes in Information Hiding // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 121-138. 34. Koen Koning, Herbert Bos. No Need to Hide: Protecting Safe Regions on Commodity Hardware // Proceedings of the Twelfth European Conference on Computer Systems. 2017. pp. 437-452. 35. Erik Bosman, Kaveh Razavi. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector // Proceedings of the IEEE Symposium on Security and Privacy. 2016. pp. 987-1004. 36. Evtyushkin, D., Ponomarev, D. Jump over ASLR: Attacking branch predictors to bypass ASLR // Proceedings of the 49th International Symposium on Microarchitecture. 2016. pp. 1-13. 37. Daniel Gruss, Moritz Lipp. KASLR is Dead: Long Live KASLR. 2017 // URL: https://github.com/IAIK/KAISER (дата обращения: 8 мая 2017). 38. Eric Butler. The Secret Life of SIM Cards // DEFCON 21. 2013. 39. Charlie Miller. Battery Firmware Hacking // Black Hat. 2011. 40. Yan Michalevsky. Gyrophone: Recognizing Speech From Gyroscope Signals // Black Hat. 2014. 41. Yan Michalevsky (Stanford). PowerSpy: Location Tracking using Mobile Device Power Analysis // 24th USENIX Security Symposium. 2015. pp. 785-800. 42. Bruce Potter. Dirty Little Secrets of Information Security // DEFCON 15. 2007. 43. Dr. Richard J. Danzig. Inherent Cyber Insecurity and Our National Security: Surviving on a Diet of Poisoned Fruit // 24th USENIX Security Symposium. 2015. 44. Frank Konieczny. SEADE: Countering the Futility of Network Security // Air & Space Power Journal. 29(5), 2015. pp. 4-14. 45. Silke Holtmanns, Bhanu Kotte, Siddharth Rao. Detach me not DoS attacks against 4G cellular users worldwide from your desk // Black Hat. 2016. 46. Marina Bay Sands. 3G/4G Intranet Scanning and its Application on the WormHole Vulnerability // Black Hat. 2017. 47. Collin Mulliner. Probing Mobile Operator Networks // Black Hat. 2012. 48. Dave Blair. Any Time, Every Place: The Networked Societies of War Fighters in a Battlespace of Flows // Air & Space Power Journal. 29(5), 2015. pp. 15-30. 49. Nico Golde, Kévin Redon. Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks // 22nd USENIX Security Symposium. 2013. pp. 33-48. 50. Moritz Lipp, Daniel Gruss. ARMageddon: Cache Attacks on Mobile Devices // Proceedings of the 25th USENIX Security Symposium. 2016. pp. 549-564. 51. Chris Babcock. Preparing for the Cyber Battleground of the Future // Air & Space Power Journal. 29(6), 2015. pp. 61-73.