Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
17
views
17
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,515
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2016
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
other
Author(s):
Nico Weichbrodt
,
Anil Kurmus
,
Peter Pietzuch
,
Rüdiger Kapitza
Publication date
(Online):
September 15 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
17
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Innovative instructions and software model for isolated execution
Frank McKeen
,
Ilya Alexandrovich
,
Alex Berenzon
…
(2013)
0
comments
Cited
70
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
(2015)
0
comments
Cited
68
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
VC3: Trustworthy Data Analytics in the Cloud Using SGX
Félix Schuster
,
Manuel Paulino Costa
,
Cédric Fournet
…
(2015)
0
comments
Cited
63
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
September 15 2016
Pages
: 440-457
DOI:
10.1007/978-3-319-45744-4_22
SO-VID:
094b39e3-b7c1-4e2a-8d18-aa67986449c6
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
pp. 27
Toward an Efficient Website Fingerprinting Defense
pp. 47
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
pp. 69
Comparing Password Ranking Algorithms on Real-World Password Datasets
pp. 91
Scalable Two-Factor Authentication Using Historical Data
pp. 111
On the Implications of Zipf’s Law in Passwords
pp. 135
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
pp. 154
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
pp. 173
Efficient Encrypted Keyword Search for Multi-user Data Sharing
pp. 199
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis
pp. 217
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
pp. 238
A Machine Learning Approach for Detecting Third-Party Trackers on the Web
pp. 261
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
pp. 279
Attribute-Based Signatures for Supporting Anonymous Certification
pp. 301
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes
pp. 324
Lightweight Delegatable Proofs of Storage
pp. 344
Anonymous RAM
pp. 363
Efficient Sanitizable Signatures Without Random Oracles
pp. 383
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook
pp. 401
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
pp. 422
NaClDroid: Native Code Isolation for Android Applications
pp. 440
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
pp. 458
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
pp. 477
Android Permission Recommendation Using Transitive Bayesian Inference Model
pp. 501
Spot the Difference: Secure Multi-execution and Multiple Facets
pp. 520
On Reductions from Multi-Domain Noninterference to the Two-Level Case
pp. 538
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries
pp. 561
Let’s Face It: Faceted Values for Taint Tracking
pp. 581
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming
pp. 602
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
Similar content
1,515
eMotion: An SGX extension for migrating enclaves
Authors:
Jaemin Park
,
Sungjin Park
,
Brent Byunghoon Kang
…
Dynamic Memory Protection via Intel SGX-Supported Heap Allocation
Authors:
Saman Zonouz
,
Mingbo Zhang
,
Pengfei Sun
…
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
Authors:
Fergus Dall
,
Gabrielle De Micheli
,
Thomas Eisenbarth
…
See all similar
Cited by
14
On Security Analysis of Proof-of-Elapsed-Time (PoET)
Authors:
Lin Chen
,
Lei Xu
,
Nolan Shah
…
CacheZoom: How SGX Amplifies the Power of Cache Attacks
Authors:
Ahmad Moghimi
,
Gorka Irazoqui
,
Thomas Eisenbarth
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Authors:
Ahmad Moghimi
,
Gorka Irazoqui
,
Thomas Eisenbarth
See all cited by