ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
41
views
26
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,576
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Detection of Intrusions and Malware, and Vulnerability Assessment
Malware Guard Extension: Using SGX to Conceal Cache Attacks
other
Author(s):
Michael Schwarz
,
Samuel Weiser
,
Daniel Gruss
,
Clémentine Maurice
,
Stefan Mangard
Publication date
(Online):
June 04 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH title and first author match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genome Engineering using CRISPR
Most cited references
26
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
(2015)
0
comments
Cited
67
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
VC3: Trustworthy Data Analytics in the Cloud Using SGX
Félix Schuster
,
Manuel Paulino Costa
,
Cédric Fournet
…
(2015)
0
comments
Cited
63
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu
,
Yuval Yarom
,
Qian Ge
…
(2015)
0
comments
Cited
60
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
June 04 2017
Pages
: 3-24
DOI:
10.1007/978-3-319-60876-1_1
SO-VID:
09d263ed-94df-4be5-a029-677f18240e7c
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Malware Guard Extension: Using SGX to Conceal Cache Attacks
pp. 25
On the Trade-Offs in Oblivious Execution Techniques
pp. 48
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
pp. 73
Measuring and Defeating Anti-Instrumentation-Equipped Malware
pp. 97
DynODet: Detecting Dynamic Obfuscation in Malware
pp. 119
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
pp. 141
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
pp. 161
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
pp. 209
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
pp. 230
SPEAKER: Split-Phase Execution of Application Containers
pp. 252
Deep Ground Truth Analysis of Current Android Malware
pp. 279
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
pp. 301
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
pp. 325
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
pp. 347
On the Privacy Impacts of Publicly Leaked Password Databases
pp. 366
Unsupervised Detection of APT C&C Channels using Web Request Graphs
pp. 388
Measuring Network Reputation in the Ad-Bidding Process
Similar content
2,576
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution
Authors:
Guoxing Chen
,
Sanchuan Chen
,
Yuan Xiao
…
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
Authors:
Jaebaek Seo
,
Byoungyoung Lee
,
Seongmin Kim
…
“SGX-Log: securing system logs with SGX,”
Authors:
V Karande
,
E. Bauman
,
Z. Lin
…
See all similar
Cited by
10
A survey on zero knowledge range proofs and applications
Authors:
Eduardo Morais
,
Tommy Koens
,
Cees van Wijk
…
Asymmetric cryptography with physical unclonable keys
Authors:
Ravitej Uppu
,
Tom Wolterink
,
Sebastianus Goorden
…
SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation
Authors:
Yanjiao Chen
,
Xin Tian
,
Qian Wang
…
See all cited by