A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Attack.
Mohammad Sina KarvandiSaleh Khalaj MonfaredMohammad Sina KiarostamiDara RahmatiSaeid GorginPublished in: CoRR (2020)
Keyphrases
- countermeasures
- power analysis
- secret key
- smart card
- object recognition
- shape descriptors
- database
- action recognition
- keypoints
- feature descriptors
- information security
- image descriptors
- image retrieval
- detection mechanism
- bag of words
- local binary pattern
- texture descriptors
- image matching
- feature representation
- denial of service attacks