05.01.2017 Views

arXiv:1611.03748v1

e7az7vG

e7az7vG

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[112] K. Tobich, P. Maurine, P. Liardet, M. Lisart, and T. Ordas, “Voltage<br />

Spikes on the Substrate to Obtain Timing Faults,” in Digital System<br />

Design – DSD 2013. IEEE Computer Society, 2013, pp. 483–486.<br />

[113] C. O’Flynn, “Fault Injection using Crowbars on Embedded Systems,”<br />

IACR Cryptology ePrint Archive, vol. 2016, p. 810, 2016.<br />

[114] S. Ordas, L. Guillaume-Sage, and P. Maurine, “Electromagnetic<br />

Fault Injection: The Curse of Flip-Flops,” Journal of Cryptographic<br />

Engineering, pp. 1–15, 2016.<br />

[115] L. Rivière, Z. Najm, P. Rauzy, J. Danger, J. Bringer, and L. Sauvage,<br />

“High Precision Fault Injections on the Instruction Cache of<br />

ARMv7-M Architectures,” in Hardware Oriented Security and Trust<br />

– HOST 2015. IEEE Computer Society, 2015, pp. 62–67.<br />

[116] S. P. Skorobogatov and R. J. Anderson, “Optical Fault Induction<br />

Attacks,” in Cryptographic Hardware and Embedded Systems –<br />

CHES 2002, ser. LNCS, vol. 2523. Springer, 2002, pp. 2–12.<br />

[117] J. G. J. van Woudenberg, M. F. Witteman, and F. Menarini, “Practical<br />

Optical Fault Injection on Secure Microcontrollers,” in Fault<br />

Diagnosis and Tolerance in Cryptography – FDTC 2011. IEEE<br />

Computer Society, 2011, pp. 91–99.<br />

[118] C. Roscian, A. Sarafianos, J. Dutertre, and A. Tria, “Fault Model<br />

Analysis of Laser-Induced Faults in SRAM Memory Cells,” in Fault<br />

Diagnosis and Tolerance in Cryptography – FDTC 2013. IEEE<br />

Computer Society, 2013, pp. 89–98.<br />

[119] S. Skorobogatov, “The Bumpy Road Towards iPhone 5c NAND<br />

Mirroring,” CoRR, vol. abs/1609.04327, 2016.<br />

[120] M. Hutter and J. Schmidt, “The Temperature Side Channel and<br />

Heating Fault Attacks,” in Smart Card Research and Advanced<br />

Applications – CARDIS 2013, ser. LNCS, vol. 8419. Springer,<br />

2013, pp. 219–235.<br />

[121] T. Müller and M. Spreitzenbarth, “FROST - Forensic Recovery<br />

of Scrambled Telephones,” in Applied Cryptography and Network<br />

Security – ACNS 2013, ser. LNCS, vol. 7954. Springer, 2013, pp.<br />

373–388.<br />

[122] G. He, M. Yang, X. Gu, J. Luo, and Y. Ma, “A Novel Active<br />

Website Fingerprinting Attack Against Tor Anonymous System,” in<br />

Computer Supported Cooperative Work in Design – CSCWD 2014.<br />

IEEE, 2014, pp. 112–117.<br />

[123] Y. Kim, R. Daly, J. Kim, C. Fallin, J. Lee, D. Lee, C. Wilkerson,<br />

K. Lai, and O. Mutlu, “Flipping Bits in Memory Without Accessing<br />

Them: An Experimental Study of DRAM Disturbance Errors,” in<br />

International Symposium on Computer Architecture – ISCA 2014.<br />

IEEE Computer Society, 2014, pp. 361–372.<br />

[124] M. Seaborn and T. Dullien, “Exploiting the DRAM Rowhammer<br />

Bug to Gain Kernel Privileges,” Blackhat 2015.<br />

[125] D. Gruss, C. Maurice, and S. Mangard, “Rowhammer.js: A Remote<br />

Software-Induced Fault Attack in JavaScript,” in Detection of Intrusions<br />

and Malware & Vulnerability Assessment – DIMVA 2016, ser.<br />

LNCS, vol. 9721. Springer, 2016, pp. 300–321.<br />

[126] V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice,<br />

G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, “Drammer: Deterministic<br />

Rowhammer Attacks on Mobile Platforms,” in Conference<br />

on Computer and Communications Security – CCS 2016. ACM,<br />

2016, pp. 1675–1689.<br />

[127] V. Lomné, T. Roche, and A. Thillard, “On the Need of Randomness<br />

in Fault Attack Countermeasures - Application to AES,” in Fault<br />

Diagnosis and Tolerance in Cryptography – FDTC 2012. IEEE<br />

Computer Society, 2012, pp. 85–94.<br />

[128] T. Kwon and S. Na, “TinyLock: Affordable Defense Against<br />

Smudge Attacks on Smartphone Pattern Lock Systems,” Computers<br />

& Security, vol. 42, pp. 137–150, 2014.<br />

[129] K. Krombholz, T. Hupperich, and T. Holz, “Use the Force: Evaluating<br />

Force-Sensitive Authentication for Mobile Devices,” in Symposium<br />

On Usable Privacy and Security – SOUPS 2016. USENIX<br />

Association, 2016, pp. 207–219.<br />

[130] C. V. Wright, S. E. Coull, and F. Monrose, “Traffic Morphing: An<br />

Efficient Defense Against Statistical Traffic Analysis,” in Network<br />

and Distributed System Security Symposium – NDSS 2009. The<br />

Internet Society, 2009.<br />

[131] X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and<br />

R. Perdisci, “HTTPOS: Sealing Information Leaks with Browserside<br />

Obfuscation of Encrypted Flows,” in Network and Distributed<br />

System Security Symposium – NDSS 2011. The Internet Society,<br />

2011.<br />

[132] K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton, “Peek-a-<br />

Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures<br />

Fail,” in IEEE Symposium on Security and Privacy – S&P<br />

2012. IEEE Computer Society, 2012, pp. 332–346.<br />

[133] X. Cai, R. Nithyanand, and R. Johnson, “CS-BuFLO: A Congestion<br />

Sensitive Website Fingerprinting Defense,” in Workshop on Privacy<br />

in the Electronic Society – WPES 2014. ACM, 2014, pp. 121–130.<br />

[134] R. Nithyanand, X. Cai, and R. Johnson, “Glove: A Bespoke Website<br />

Fingerprinting Defense,” in Workshop on Privacy in the Electronic<br />

Society – WPES 2014. ACM, 2014, pp. 131–134.<br />

[135] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner,<br />

“Android Permissions: User Attention, Comprehension, and Behavior,”<br />

in Symposium On Usable Privacy and Security – SOUPS 2012.<br />

ACM, 2012, p. 3.<br />

[136] G. Petracca, Y. Sun, T. Jaeger, and A. Atamli, “AuDroid: Preventing<br />

Attacks on Audio Channels in Mobile Devices,” in Annual Computer<br />

Security Applications Conference – ACSAC 2015. ACM, 2015, pp.<br />

181–190.<br />

[137] P. Shrestha, M. Mohamed, and N. Saxena, “Slogger: Smashing<br />

Motion-based Touchstroke Logging with Transparent System<br />

Noise,” in Security and Privacy in Wireless and Mobile Networks –<br />

WISEC 2016. ACM, 2016, pp. 67–77.<br />

[138] H. Wang, T. T. Lai, and R. R. Choudhury, “MoLe: Motion Leaks<br />

through Smartwatch Sensors,” in Mobile Computing and Networking<br />

– MOBICOM 2015. ACM, 2015, pp. 155–166.<br />

[139] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, “When Good<br />

Becomes Evil: Keystroke Inference with Smartwatch,” in Conference<br />

on Computer and Communications Security – CCS 2015. ACM,<br />

2015, pp. 1273–1285.<br />

[140] A. Maiti, O. Armbruster, M. Jadliwala, and J. He, “Smartwatch-<br />

Based Keystroke Inference Attacks and Context-Aware Protection<br />

Mechanisms,” in Asia Conference on Computer and Communications<br />

Security – AsiaCCS. ACM, 2016, pp. 795–806.<br />

[141] C. Wang, X. Guo, Y. Wang, Y. Chen, and B. Liu, “Friend or<br />

Foe?: Your Wearable Devices Reveal Your Personal PIN,” in Asia<br />

Conference on Computer and Communications Security – AsiaCCS.<br />

ACM, 2016, pp. 189–200.<br />

[142] A. Sarkisyan, R. Debbiny, and A. Nahapetian, “WristSnoop: Smartphone<br />

PINs Prediction Using Smartwatch Motion Sensors,” in Workshop<br />

on Information Forensics and Security – WIFS 2015. IEEE,<br />

2015, pp. 1–6.<br />

[143] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(Smart)Watch<br />

Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches,”<br />

in International Symposium on Wearable Computers –<br />

ISWC 2015. ACM, 2015, pp. 27–30.<br />

[144] L. Arduser, P. Bissig, P. Brandes, and R. Wattenhofer, “Recognizing<br />

Text Using Motion Data From a Smartwatch,” in Pervasive Computing<br />

and Communication Workshops – PerCom 2016. IEEE<br />

Computer Society, 2016, pp. 1–6.<br />

[145] B. Farshteindiker, N. Hasidim, A. Grosz, and Y. Oren, “How to<br />

Phone Home with Someone Else’s Phone: Information Exfiltration<br />

Using Intentional Sound Noise on Gyroscopic Sensors,” in Workshop<br />

on Offensive Technologies – WOOT 2016. USENIX Association,<br />

2016.<br />

[146] C. P. García, B. B. Brumley, and Y. Yarom, “”Make Sure DSA<br />

Signing Exponentiations Really are Constant-Time”,” in Conference<br />

on Computer and Communications Security – CCS 2016. ACM,<br />

2016, pp. 1639–1650.<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!