Back to Results
First PageMeta Content
Key management / Electronic commerce / RSA / Side channel attack / Public key fingerprint / Xen / Ciphertext / CPU cache / Key / Cryptography / Public-key cryptography / Cache


Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels
Add to Reading List

Document Date: 2012-12-24 14:28:56


Open Document

File Size: 335,86 KB

Share Result on Facebook

City

Raleigh / /

Company

Rackspace / Amazon / Citrix / VMWare / Intel / Microsoft / /

Country

United States / /

Currency

USD / /

/

Event

Product Issues / Product Recall / /

Facility

Thomas Ristenpart University of North Carolina Chapel Hill / As square / Extract Private Keys Yinqian Zhang Ari Juels University of North Carolina Chapel Hill / VM’s library / USA University of Wisconsin Madison / /

IndustryTerm

embedded uniprocessor device / quad-core processor / final processing step / triple-merging algorithm / brute-force search / symmetric multi-processing / victim device / http /

OperatingSystem

VMs / Linux / Ubuntu / Microsoft Windows / Gnu / /

Organization

University of North Carolina / U.S. Securities and Exchange Commission / Extract Private Keys Yinqian Zhang Ari Juels University / USA University of Wisconsin Madison / /

Person

Michael K. Reiter / Keys Yinqian Zhang Ari / /

/

Position

Non-Work-Conserving Scheduler / General / spy / current Xen scheduler / Xen scheduler / representative / scheduler / credit scheduler / Work-Conserving Scheduler / controller / Xen credit scheduler / /

Product

perS M R / Code-path reassembly / M-16 / /

ProvinceOrState

North Carolina / /

RadioStation

Core 2 / /

Technology

virtual machine / modified majoritydecoding algorithm / prime-probe protocol / bioinformatics / Viterbi algorithm / Linux / Yorkfield processor / private key / secret key / machine learning / multicore processors / operating system / exponentiation algorithm / basic greedy algorithm / shared memory / OPERATING SYSTEMS / triple-merging algorithm / BaumWelch algorithm / DP algorithm / ElGamal encryption / virtualization technologies / cryptographic algorithm / encryption / error-correction algorithm / one processor / public key / DNA sequencing / dynamic programming algorithm / so-called prime-probe protocol / symmetric multiprocessing system / x86 processors / /

URL

http /

SocialTag