Page 170 - 《软件学报》2020年第10期
P. 170
3146 Journal of Software 软件学报 Vol.31, No.10, October 2020
[128] Brasser F, Müller U, Dmitrienko A, Kostiainen K, Capkun S, Sadeghi AR. Software grand exposure: SGX cache attacks are
practical. In: Proc. of the 11th USENIX Workshop on Offensive Technologies (WOOT). USENIX Association, 2017. [doi: 10.
5555/3154768.3154779]
[129] Chen SC, Zhang XK, Reiter MK, Zhang YQ. Detecting privileged side-channel attacks in shielded execution with Déjá Vu. In:
Proc. of the 12th ACM Asia Conf. on Computer and Communications Security (ASIACCS). ACM, 2017. 7–18. [doi: 10.1145/
3052973.3053007]
[130] Fu YC, Bauman E, Quinonez R, Lin ZQ. SGX-LAPD: Thwarting controlled side channel attacks via enclave verifiable page
faults. In: Proc. of the 20th Int’l Symp. on Research in Attacks, Intrusions, and Defenses (RAID). Cham: Springer-Verlag, 2017.
357–380. [doi: 10.1007/978-3-319-66332-6_16]
[131] Götzfried J, Eckert M, Schinzel S, Müller T. Cache attacks on Intel SGX. In: Proc. of the 10th European Workshop on Systems
Security (EuroSec). ACM, 2017. 2:1–2:6. [doi: 10.1145/3065913.3065915]
[132] Hähnel M, Cui WD, Peinado M. High-resolution side channels for untrusted operating systems. In: Proc. of the 2017 USENIX
Annual Technical Conf. (USENIX ATC). USENIX Association, 2017. 299–312. [doi: 10.5555/3154690.3154719]
[133] Moghimi A, Irazoqui G, Eisenbarth T. CacheZoom: how SGX amplifies the power of cache attacks. In: Proc. of the 19th Int’l
Conf. on Cryptographic Hardware and Embedded Systems (CHES). Cham: Springer-Verlag, 2017. 69–90. [doi: 10.1007/978-3-
319-66787-4_4]
[134] Schwarz M, Weiser S, Gruss D, Maurice C, Mangard S. Malware guard extension: Using SGX to conceal cache attacks. In: Proc.
of the 14th Int’l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Cham: Springer-Verlag,
2017. 3–24. [doi: 10.1007/978-3-319-60876-1_1]
[135] Shinde S, Chua ZL, Narayanan V, Saxena P. Preventing page faults from telling your secrets. In: Proc of the 11th ACM Asia
Conf. on Computer and Communications Security (ASIACCS). ACM, 2016. 317–328. [doi: 10.1145/2897845.2897885]
[136] Wang WH, Chen GX, Pan XR, Zhang YQ, Wang XF, Bindschaedler V, Tang HX, Gunter CA. Leaky cauldron on the dark land:
understanding memory side-channel hazards in SGX. In: Proc of the 24th ACM SIGSAC Conf. on Computer and Communications
Security (CCS). ACM, 2017. 2421–2434. [doi: 10.1145/3133956.3134038]
[137] Xu YZ, Cui WD, Peinado M. Controlled-channel attacks: deterministic side channels for untrusted operating systems. In: Proc. of
the 36th IEEE Symp. on Security and Privacy (SP). IEEE, 2015. 640–656. [doi: 10.1109/SP.2015.45]
[138] Yarom Y, Falkner K. FLUSH+ RELOAD: A high resolution, low noise, L3 cache side-channel attack. In: Proc. of the 23rd
USENIX Security Symp. (USENIX Security). USENIX Association, 2014. 719–732. [doi: 10.5555/2671225.2671271]
附中文参考文献:
[46] 霍文捷.嵌入式处理器安全运行机制的研究与设计[博士学位论文].武汉:华中科技大学,2010.
[113] 张美玉.基于片上内存的可信执行环境抗物理攻击研究[硕士学位论文].北京:首都师范大学,2019.
张倩颖(1986-),女,博士,讲师,CCF 专业会 赵世军(1985-),男,博士,华为技术有限公
员,主要研究领域为嵌入式操作系统,系统 司技术专家,主要研究领域为信息安全,系
安全,形式化验证. 统安全,可信计算.