Minimizing Side-Channel Attack Vulnerability via Schedule Randomization.
Nils VremanRichard PatesKristin KrügerGerhard FohlerMartina MaggioPublished in: CDC (2019)
Keyphrases
- countermeasures
- power analysis
- attack graphs
- scheduling problem
- secret key
- penetration testing
- security vulnerabilities
- attack graph
- information security
- buffer overflow
- privacy preserving
- completion times
- scheduling algorithm
- denial of service
- security measures
- risk assessment
- dos attacks
- neural network
- open shop
- security risks
- single machine scheduling problem
- information retrieval
- smart card
- case study
- block cipher
- critical path
- real time
- data mining
- single machine
- search engine
- website
- decision making