2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7192857
|View full text |Cite
|
Sign up to set email alerts
|

A security model for timing attack in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111], [112]. Le et al [18] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111], [112]. Le et al [18] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [169], [170]. Le et al [17] explain reliance on obscurity for security, bad programming practices, and lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: ) Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Side-channel attacks are typically timing attacks, power monitoring attacks, electromagnetic leaks, acoustic signals, transient characteristics, or data remanence at hardware or software levels [111,112]. Le et al [15] explained reliance on obscurity for security, bad programming practices, lack of cryptographic-or insufficient hardware protection can cause side-channel attacks affecting critical devices like ECUs or V2X communications.…”
Section: Defenses Against Side-channel Attackmentioning
confidence: 99%