Login / Signup
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Tom van Goethem
Christina Pöpper
Wouter Joosen
Mathy Vanhoef
Published in:
USENIX Security Symposium (2020)
Keyphrases
</>
countermeasures
stepping stones
database systems
real time
concurrency control
information flow
malicious users
information retrieval
privacy preserving
private information
transaction processing
digital images
computer security
denial of service attacks
concurrent execution