Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks.
Yanqi ZhouSameer WaghPrateek MittalDavid WentzlaffPublished in: HPCA (2017)
Keyphrases
- traffic analysis
- ddos attacks
- network traffic
- denial of service attacks
- denial of service
- dos attacks
- normal traffic
- traffic data
- data corruption
- traffic flow
- countermeasures
- stepping stones
- memory requirements
- internet traffic
- security threats
- real time
- malicious traffic
- memory space
- phishing attacks
- memory usage
- watermarking scheme
- network security
- traffic management
- malicious attacks
- worm detection
- computing power
- road network
- neural network
- traffic signal
- memory size
- origin destination
- traffic control
- traffic congestion
- security protocols
- limited memory