iTimed: Cache Attacks on the Apple A10 Fusion SoC.
Gregor HaasSeetal PotluriAydin AysuPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- countermeasures
- information fusion
- hardware and software
- prefetching
- data fusion
- fusion method
- low power
- query processing
- data access
- fusion process
- malicious users
- denial of service attacks
- traffic analysis
- security threats
- security mechanisms
- cooperative
- watermarking scheme
- image fusion
- malicious attacks
- cache management
- attack detection
- access patterns
- security protocols
- back end
- embedded systems
- multiresolution