Page 170 - 《软件学报》2020年第10期
P. 170

3146                                  Journal of Software  软件学报 Vol.31, No.10, October 2020

         [128]    Brasser F, Müller U, Dmitrienko A, Kostiainen  K, Capkun  S,  Sadeghi AR.  Software  grand exposure:  SGX cache attacks are
              practical. In: Proc. of the 11th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association, 2017. [doi: 10.
              5555/3154768.3154779]
         [129]    Chen SC, Zhang XK, Reiter MK, Zhang YQ. Detecting privileged side-channel attacks in shielded execution with Déjá Vu. In:
              Proc. of the 12th ACM Asia Conf. on Computer and Communications Security (ASIACCS). ACM, 2017. 7–18. [doi: 10.1145/
              3052973.3053007]
         [130]    Fu  YC, Bauman E, Quinonez R, Lin  ZQ.  SGX-LAPD:  Thwarting controlled  side channel attacks  via enclave  verifiable  page
              faults. In: Proc. of the 20th Int’l Symp. on Research in Attacks, Intrusions, and Defenses (RAID). Cham: Springer-Verlag, 2017.
              357–380. [doi: 10.1007/978-3-319-66332-6_16]
         [131]    Götzfried J, Eckert M, Schinzel S, Müller T. Cache attacks on Intel SGX. In: Proc. of the 10th European Workshop on Systems
              Security (EuroSec). ACM, 2017. 2:1–2:6. [doi: 10.1145/3065913.3065915]
         [132]    Hähnel M, Cui WD, Peinado M. High-resolution side channels for untrusted operating systems. In: Proc. of the 2017 USENIX
              Annual Technical Conf. (USENIX ATC). USENIX Association, 2017. 299–312. [doi: 10.5555/3154690.3154719]
         [133]    Moghimi A, Irazoqui G, Eisenbarth T. CacheZoom: how SGX amplifies the power of cache attacks. In: Proc. of the 19th Int’l
              Conf. on Cryptographic Hardware and Embedded Systems (CHES). Cham: Springer-Verlag, 2017. 69–90. [doi: 10.1007/978-3-
              319-66787-4_4]
         [134]    Schwarz M, Weiser S, Gruss D, Maurice C, Mangard S. Malware guard extension: Using SGX to conceal cache attacks. In: Proc.
              of the 14th Int’l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Cham: Springer-Verlag,
              2017. 3–24. [doi: 10.1007/978-3-319-60876-1_1]
         [135]    Shinde S, Chua ZL, Narayanan V, Saxena P. Preventing page faults from telling your secrets. In: Proc of the 11th ACM Asia
              Conf. on Computer and Communications Security (ASIACCS). ACM, 2016. 317–328. [doi: 10.1145/2897845.2897885]
         [136]    Wang WH, Chen GX, Pan XR, Zhang YQ, Wang XF, Bindschaedler V, Tang HX, Gunter CA. Leaky cauldron on the dark land:
              understanding memory side-channel hazards in SGX. In: Proc of the 24th ACM SIGSAC Conf. on Computer and Communications
              Security (CCS). ACM, 2017. 2421–2434. [doi: 10.1145/3133956.3134038]
         [137]    Xu YZ, Cui WD, Peinado M. Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: Proc. of
              the 36th IEEE Symp. on Security and Privacy (SP). IEEE, 2015. 640–656. [doi: 10.1109/SP.2015.45]
         [138]    Yarom  Y, Falkner K. FLUSH+  RELOAD:  A high resolution, low noise, L3  cache  side-channel  attack. In: Proc. of the 23rd
              USENIX Security Symp. (USENIX Security). USENIX Association, 2014. 719–732. [doi: 10.5555/2671225.2671271]

         附中文参考文献:
          [46]    霍文捷.嵌入式处理器安全运行机制的研究与设计[博士学位论文].武汉:华中科技大学,2010.
         [113]    张美玉.基于片上内存的可信执行环境抗物理攻击研究[硕士学位论文].北京:首都师范大学,2019.


                       张倩颖(1986-),女,博士,讲师,CCF 专业会                   赵世军(1985-),男,博士,华为技术有限公
                       员,主要研究领域为嵌入式操作系统,系统                          司技术专家,主要研究领域为信息安全,系
                       安全,形式化验证.                                    统安全,可信计算.
   165   166   167   168   169   170   171   172   173   174   175