منابع مشابه
Enhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملCombination of Colour Favoured and Colour
In this research we described the effective Hamiltonian theory and applied this theory to the calculation of current-current (Q1,2) and QCD penguin (Q3,…,6) c quark decay rates. We calculated the decay rates of semileptonic and hadronic of charm quark in the effective Hamiltonian theory. We investigated the decay rates of D meson decays according to Spectator Quark Model (SQM) for the calculati...
متن کاملA Colour Design Tool Based on Empirical Studies
A colour design tool targeted at both unskilled consumers and professional designers is currently under development, on the basis of psychophysical studies into semantic associations of colour, the cultural influences and colour harmony. From experimental results for single-colour associations, 3 underlying factors were identified: “warm-cool”, “heavy-light” and “active-passive”, which were fou...
متن کاملFlush+Flush: A Fast and Stealthy Cache Attack
Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. The Flush+Flus...
متن کاملFlush+Flush: A Stealthier Last-Level Cache Attack
Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. The Flush+Flus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Japan Society of Colour Material
سال: 1956
ISSN: 0010-180X
DOI: 10.4011/shikizai1937.29.239