Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Advisor
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
Adelaide Research & Scholarship
Adelaide Research & Scholarship
Search
Search:
All collections
Schools and Disciplines
School of Computer Science
Computer Vision
Formal Modelling and Verification
Computer Science publications
for
Current filters:
Title
Author
Subject
Date Issued
Advisor
School
Department
Organisation
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Advisor
School
Department
Organisation
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Advisor
School
Department
Organisation
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Advisor
School
Department
Organisation
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-6 of 6 (Search time: 0.002 seconds).
previous
1
next
Item hits:
Preview
Issue Date
Title
Author(s)
2021
Prime+Probe 1, JavaScript 0: Overcoming browser-based side-channel defenses
Shusterman, A.
;
Agarwal, A.
;
O'Connell, S.
;
Genkin, D.
;
Oren, Y.
;
Yarom, Y.
;
30th USENIX Security Symposium (11 Aug 2021 - 13 Aug 2021 : virtual online)
2021
Nonce@Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms
Alam, M.
;
Yilmaz, B.
;
Werner, F.
;
Samwel, N.
;
Zajic, A.
;
Genkin, D.
;
Yarom, Y.
;
Prvulovic, M.
;
IEEE European Symposium on Security and Privacy (EuroS&P) (6 Sep 2021 - 10 Sep 2021 : Virtual Online)
2021
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
Shelton, M.A.
;
Chmielewski, Ł.
;
Samwel, N.
;
Wagner, M.
;
Batina, L.
;
Yarom, Y.
;
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security (15 Nov 2021 - 19 Nov 2021 : virtual online)
2021
Whack-a-meltdown: microarchitectural security games
Genkin, D.
;
Yarom, Y.
2021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
Shusterman, A.
;
Avraham, Z.
;
Croitoru, E.
;
Haskal, Y.
;
Kang, L.
;
Levi, D.
;
Meltser, Y.
;
Mittal, P.
;
Oren, Y.
;
Yarom, Y.
2021
ROSITA: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Shelton, M.A.
;
Samwel, N.
;
Batina, L.
;
Regazzoni, F.
;
Wagner, M.
;
Yarom, Y.
;
Network and Distributed Systems Security Symposium (NDSS) (21 Feb 2021 - 25 Feb 2021 : virtual online)
Discover
Author
3
Genkin, D.
3
Samwel, N.
2
Batina, L.
2
Oren, Y.
2
Shelton, M.A.
2
Shusterman, A.
2
Wagner, M.
1
30th USENIX Security Symposium (1...
1
Agarwal, A.
1
Alam, M.
.
next >
Subject
1
Power analysis leakage; multivari...
1
Side-channel attacks; deep learni...