Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
| dc.contributor.author | Van Goethem, Tom | |
| dc.contributor.author | Popper, Christina | |
| dc.contributor.author | Joosen, Wouter | |
| dc.contributor.author | Vanhoef, Mathy | |
| dc.date.accessioned | 2021-12-09T13:41:09Z | |
| dc.date.available | 2021-11-02T15:59:26Z | |
| dc.date.available | 2021-12-09T13:41:09Z | |
| dc.date.issued | 2020 | |
| dc.identifier.issn | na | |
| dc.identifier.other | WOS:000668146200112 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/37752.2 | |
| dc.source | WOS | |
| dc.title | Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections | |
| dc.type | Proceedings paper | |
| dc.contributor.imecauthor | Joosen, Wouter | |
| dc.identifier.eisbn | 978-1-939133-17-5 | |
| dc.source.numberofpages | 18 | |
| dc.source.peerreview | yes | |
| dc.source.beginpage | 1985 | |
| dc.source.endpage | 2002 | |
| dc.source.conference | 29th USENIX Security Symposium | |
| dc.source.conferencedate | AUG 12-14, 2020 | |
| dc.source.conferencelocation | Vancouver, BC, Canada | |
| dc.source.journal | na | |
| imec.availability | Published - imec |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||