arXiv:1611.03748v1
e7az7vG
e7az7vG
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
[112] K. Tobich, P. Maurine, P. Liardet, M. Lisart, and T. Ordas, “Voltage<br />
Spikes on the Substrate to Obtain Timing Faults,” in Digital System<br />
Design – DSD 2013. IEEE Computer Society, 2013, pp. 483–486.<br />
[113] C. O’Flynn, “Fault Injection using Crowbars on Embedded Systems,”<br />
IACR Cryptology ePrint Archive, vol. 2016, p. 810, 2016.<br />
[114] S. Ordas, L. Guillaume-Sage, and P. Maurine, “Electromagnetic<br />
Fault Injection: The Curse of Flip-Flops,” Journal of Cryptographic<br />
Engineering, pp. 1–15, 2016.<br />
[115] L. Rivière, Z. Najm, P. Rauzy, J. Danger, J. Bringer, and L. Sauvage,<br />
“High Precision Fault Injections on the Instruction Cache of<br />
ARMv7-M Architectures,” in Hardware Oriented Security and Trust<br />
– HOST 2015. IEEE Computer Society, 2015, pp. 62–67.<br />
[116] S. P. Skorobogatov and R. J. Anderson, “Optical Fault Induction<br />
Attacks,” in Cryptographic Hardware and Embedded Systems –<br />
CHES 2002, ser. LNCS, vol. 2523. Springer, 2002, pp. 2–12.<br />
[117] J. G. J. van Woudenberg, M. F. Witteman, and F. Menarini, “Practical<br />
Optical Fault Injection on Secure Microcontrollers,” in Fault<br />
Diagnosis and Tolerance in Cryptography – FDTC 2011. IEEE<br />
Computer Society, 2011, pp. 91–99.<br />
[118] C. Roscian, A. Sarafianos, J. Dutertre, and A. Tria, “Fault Model<br />
Analysis of Laser-Induced Faults in SRAM Memory Cells,” in Fault<br />
Diagnosis and Tolerance in Cryptography – FDTC 2013. IEEE<br />
Computer Society, 2013, pp. 89–98.<br />
[119] S. Skorobogatov, “The Bumpy Road Towards iPhone 5c NAND<br />
Mirroring,” CoRR, vol. abs/1609.04327, 2016.<br />
[120] M. Hutter and J. Schmidt, “The Temperature Side Channel and<br />
Heating Fault Attacks,” in Smart Card Research and Advanced<br />
Applications – CARDIS 2013, ser. LNCS, vol. 8419. Springer,<br />
2013, pp. 219–235.<br />
[121] T. Müller and M. Spreitzenbarth, “FROST - Forensic Recovery<br />
of Scrambled Telephones,” in Applied Cryptography and Network<br />
Security – ACNS 2013, ser. LNCS, vol. 7954. Springer, 2013, pp.<br />
373–388.<br />
[122] G. He, M. Yang, X. Gu, J. Luo, and Y. Ma, “A Novel Active<br />
Website Fingerprinting Attack Against Tor Anonymous System,” in<br />
Computer Supported Cooperative Work in Design – CSCWD 2014.<br />
IEEE, 2014, pp. 112–117.<br />
[123] Y. Kim, R. Daly, J. Kim, C. Fallin, J. Lee, D. Lee, C. Wilkerson,<br />
K. Lai, and O. Mutlu, “Flipping Bits in Memory Without Accessing<br />
Them: An Experimental Study of DRAM Disturbance Errors,” in<br />
International Symposium on Computer Architecture – ISCA 2014.<br />
IEEE Computer Society, 2014, pp. 361–372.<br />
[124] M. Seaborn and T. Dullien, “Exploiting the DRAM Rowhammer<br />
Bug to Gain Kernel Privileges,” Blackhat 2015.<br />
[125] D. Gruss, C. Maurice, and S. Mangard, “Rowhammer.js: A Remote<br />
Software-Induced Fault Attack in JavaScript,” in Detection of Intrusions<br />
and Malware & Vulnerability Assessment – DIMVA 2016, ser.<br />
LNCS, vol. 9721. Springer, 2016, pp. 300–321.<br />
[126] V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice,<br />
G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, “Drammer: Deterministic<br />
Rowhammer Attacks on Mobile Platforms,” in Conference<br />
on Computer and Communications Security – CCS 2016. ACM,<br />
2016, pp. 1675–1689.<br />
[127] V. Lomné, T. Roche, and A. Thillard, “On the Need of Randomness<br />
in Fault Attack Countermeasures - Application to AES,” in Fault<br />
Diagnosis and Tolerance in Cryptography – FDTC 2012. IEEE<br />
Computer Society, 2012, pp. 85–94.<br />
[128] T. Kwon and S. Na, “TinyLock: Affordable Defense Against<br />
Smudge Attacks on Smartphone Pattern Lock Systems,” Computers<br />
& Security, vol. 42, pp. 137–150, 2014.<br />
[129] K. Krombholz, T. Hupperich, and T. Holz, “Use the Force: Evaluating<br />
Force-Sensitive Authentication for Mobile Devices,” in Symposium<br />
On Usable Privacy and Security – SOUPS 2016. USENIX<br />
Association, 2016, pp. 207–219.<br />
[130] C. V. Wright, S. E. Coull, and F. Monrose, “Traffic Morphing: An<br />
Efficient Defense Against Statistical Traffic Analysis,” in Network<br />
and Distributed System Security Symposium – NDSS 2009. The<br />
Internet Society, 2009.<br />
[131] X. Luo, P. Zhou, E. W. W. Chan, W. Lee, R. K. C. Chang, and<br />
R. Perdisci, “HTTPOS: Sealing Information Leaks with Browserside<br />
Obfuscation of Encrypted Flows,” in Network and Distributed<br />
System Security Symposium – NDSS 2011. The Internet Society,<br />
2011.<br />
[132] K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton, “Peek-a-<br />
Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures<br />
Fail,” in IEEE Symposium on Security and Privacy – S&P<br />
2012. IEEE Computer Society, 2012, pp. 332–346.<br />
[133] X. Cai, R. Nithyanand, and R. Johnson, “CS-BuFLO: A Congestion<br />
Sensitive Website Fingerprinting Defense,” in Workshop on Privacy<br />
in the Electronic Society – WPES 2014. ACM, 2014, pp. 121–130.<br />
[134] R. Nithyanand, X. Cai, and R. Johnson, “Glove: A Bespoke Website<br />
Fingerprinting Defense,” in Workshop on Privacy in the Electronic<br />
Society – WPES 2014. ACM, 2014, pp. 131–134.<br />
[135] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner,<br />
“Android Permissions: User Attention, Comprehension, and Behavior,”<br />
in Symposium On Usable Privacy and Security – SOUPS 2012.<br />
ACM, 2012, p. 3.<br />
[136] G. Petracca, Y. Sun, T. Jaeger, and A. Atamli, “AuDroid: Preventing<br />
Attacks on Audio Channels in Mobile Devices,” in Annual Computer<br />
Security Applications Conference – ACSAC 2015. ACM, 2015, pp.<br />
181–190.<br />
[137] P. Shrestha, M. Mohamed, and N. Saxena, “Slogger: Smashing<br />
Motion-based Touchstroke Logging with Transparent System<br />
Noise,” in Security and Privacy in Wireless and Mobile Networks –<br />
WISEC 2016. ACM, 2016, pp. 67–77.<br />
[138] H. Wang, T. T. Lai, and R. R. Choudhury, “MoLe: Motion Leaks<br />
through Smartwatch Sensors,” in Mobile Computing and Networking<br />
– MOBICOM 2015. ACM, 2015, pp. 155–166.<br />
[139] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, “When Good<br />
Becomes Evil: Keystroke Inference with Smartwatch,” in Conference<br />
on Computer and Communications Security – CCS 2015. ACM,<br />
2015, pp. 1273–1285.<br />
[140] A. Maiti, O. Armbruster, M. Jadliwala, and J. He, “Smartwatch-<br />
Based Keystroke Inference Attacks and Context-Aware Protection<br />
Mechanisms,” in Asia Conference on Computer and Communications<br />
Security – AsiaCCS. ACM, 2016, pp. 795–806.<br />
[141] C. Wang, X. Guo, Y. Wang, Y. Chen, and B. Liu, “Friend or<br />
Foe?: Your Wearable Devices Reveal Your Personal PIN,” in Asia<br />
Conference on Computer and Communications Security – AsiaCCS.<br />
ACM, 2016, pp. 189–200.<br />
[142] A. Sarkisyan, R. Debbiny, and A. Nahapetian, “WristSnoop: Smartphone<br />
PINs Prediction Using Smartwatch Motion Sensors,” in Workshop<br />
on Information Forensics and Security – WIFS 2015. IEEE,<br />
2015, pp. 1–6.<br />
[143] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(Smart)Watch<br />
Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches,”<br />
in International Symposium on Wearable Computers –<br />
ISWC 2015. ACM, 2015, pp. 27–30.<br />
[144] L. Arduser, P. Bissig, P. Brandes, and R. Wattenhofer, “Recognizing<br />
Text Using Motion Data From a Smartwatch,” in Pervasive Computing<br />
and Communication Workshops – PerCom 2016. IEEE<br />
Computer Society, 2016, pp. 1–6.<br />
[145] B. Farshteindiker, N. Hasidim, A. Grosz, and Y. Oren, “How to<br />
Phone Home with Someone Else’s Phone: Information Exfiltration<br />
Using Intentional Sound Noise on Gyroscopic Sensors,” in Workshop<br />
on Offensive Technologies – WOOT 2016. USENIX Association,<br />
2016.<br />
[146] C. P. García, B. B. Brumley, and Y. Yarom, “”Make Sure DSA<br />
Signing Exponentiations Really are Constant-Time”,” in Conference<br />
on Computer and Communications Security – CCS 2016. ACM,<br />
2016, pp. 1639–1650.<br />
19