Login / Signup
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations.
Ahmad Moghimi
Jan Wichelmann
Thomas Eisenbarth
Berk Sunar
Published in:
Int. J. Parallel Program. (2019)
Keyphrases
</>
countermeasures
security protocols
website
malicious attacks
attack detection
attack graph
attack graphs
databases
efficient implementation
block cipher
dependency relations
abstract argumentation