aewag / physical-attack-collection

0 stars 0 forks source link

KOU_2023 #1893

Open aewag opened 5 days ago

aewag commented 5 days ago

WDYT? Is this publication in scope?

@inproceedings{KOU_2023,
 author = {KOU, Zili and Sinha, Sharad and HE, Wenjian and ZHANG, Wei},
 booktitle = {2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
 doi = {10.23919/date56975.2023.10137116},
 month = {April},
 publisher = {IEEE},
 title = {Cache Side-channel Attacks and Defenses of the Sliding Window Algorithm in TEEs},
 url = {http://dx.doi.org/10.23919/DATE56975.2023.10137116},
 year = {2023}
}

URL: http://dx.doi.org/10.23919/DATE56975.2023.10137116 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.23919/date56975.2023.10137116

aewag commented 5 days ago

Yes

aewag commented 4 days ago

I didnot find DOIs for the following references:

[
    {
        "key": "ref13",
        "year": "0",
        "journal-title": "Trusted firmware"
    },
    {
        "key": "ref11",
        "year": "0",
        "journal-title": "MbedTLS security disclosures"
    },
    {
        "key": "ref18",
        "article-title": "When one vulnerable primitive turns viral: Novel single-trace attacks on ecdsa and rsa",
        "author": "aldaya",
        "year": "2020",
        "journal-title": "Cryptology ePrint Archive"
    },
    {
        "key": "ref4",
        "article-title": "Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud",
        "author": "inci",
        "year": "2015",
        "journal-title": "Cryptology ePrint Archive"
    },
    {
        "key": "ref3",
        "first-page": "719",
        "article-title": "FLUSH+ RELOAD: A high resolution, low noise, 13 cache side-channel attack",
        "author": "yarom",
        "year": "2014",
        "journal-title": "23rd USENIX Security Symposium (USENIX Security 14)"
    },
    {
        "key": "ref5",
        "article-title": "Recovering cryptographic keys from partial information, by example",
        "author": "de micheli",
        "year": "2020",
        "journal-title": "Cryptology ePrint Archive"
    }
]

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "8638444",
            "name": "Alejandro Cabrera Aldaya"
        },
        {
            "authorId": "2863384",
            "name": "B. Brumley"
        }
    ],
    "doi": "10.13154/tches.v2020.i2.196-221",
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "ffb68c1ef8ead388ffbd05fdcee3004c43fff8aa",
    "title": "When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA",
    "url": "https://www.semanticscholar.org/paper/ffb68c1ef8ead388ffbd05fdcee3004c43fff8aa",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2020
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "49968838",
            "name": "Y. Yarom"
        },
        {
            "authorId": "1679867",
            "name": "K. Falkner"
        }
    ],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "447611b97696bf363409371fa6ffb7befc36e5b7",
    "title": "FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack",
    "url": "https://www.semanticscholar.org/paper/447611b97696bf363409371fa6ffb7befc36e5b7",
    "venue": "USENIX Security Symposium",
    "year": 2014
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "39173754",
            "name": "Mehmet Sinan Inci"
        },
        {
            "authorId": "2896147",
            "name": "Berk G\u00fclmezoglu"
        },
        {
            "authorId": "2835874",
            "name": "Gorka Irazoqui Apecechea"
        },
        {
            "authorId": "143719440",
            "name": "T. Eisenbarth"
        },
        {
            "authorId": "1714383",
            "name": "B. Sunar"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "8372016fe38121358163c20f88e28fc0267e30b1",
    "title": "Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud",
    "url": "https://www.semanticscholar.org/paper/8372016fe38121358163c20f88e28fc0267e30b1",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2015
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "3f725133f661baf374a419acfaf6b8d28187e90a",
    "title": "Available from the IACR Cryptology ePrint Archive as Report 2008/510. Reconstructing RSA Private Keys from Random Key Bits",
    "url": "https://www.semanticscholar.org/paper/3f725133f661baf374a419acfaf6b8d28187e90a",
    "venue": "",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "\u201cMbedTLS security disclosures.\u201d",
    "url": "",
    "venue": ":",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [
        "methodology"
    ],
    "isInfluential": false,
    "paperId": "",
    "title": "\u201cTrusted firmware.\u201d",
    "url": "",
    "venue": "trustedfirmware.org/",
    "year": null
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "2263682",
            "name": "Jo Van Bulck"
        },
        {
            "authorId": "1739936",
            "name": "Frank Piessens"
        }
    ],
    "doi": null,
    "intent": [
        "background"
    ],
    "isInfluential": false,
    "paperId": "ca9972e9932ee3037bc69dc2fd759cfaa23eb45a",
    "title": "SGX-Step: An Open-Source Framework for Precise Dissection and Practical Exploitation of Intel SGX Enclaves",
    "url": "https://www.semanticscholar.org/paper/ca9972e9932ee3037bc69dc2fd759cfaa23eb45a",
    "venue": "",
    "year": null
}