↓ Skip to main content

Innovative Security Solutions for Information Technology and Communications

Overview of attention for book
Cover of 'Innovative Security Solutions for Information Technology and Communications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Ultralightweight Cryptography
  3. Altmetric Badge
    Chapter 2 Android Malware Analysis: From Technical Difficulties to Scientific Challenges
  4. Altmetric Badge
    Chapter 3 Post-quantum Cryptography and a (Qu)Bit More
  5. Altmetric Badge
    Chapter 4 Normalization of Java Source Codes
  6. Altmetric Badge
    Chapter 5 HiddenApp - Securing Linux Applications Using ARM TrustZone
  7. Altmetric Badge
    Chapter 6 Security Knowledge Management in Open Source Software Communities
  8. Altmetric Badge
    Chapter 7 Formal Security Analysis of Cloud-Connected Industrial Control Systems
  9. Altmetric Badge
    Chapter 8 A Hybrid Searchable Encryption Scheme for Cloud Computing
  10. Altmetric Badge
    Chapter 9 Securing Cloud Storage by Transparent Biometric Cryptography
  11. Altmetric Badge
    Chapter 10 Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks
  12. Altmetric Badge
    Chapter 11 An Evaluation of OCR Systems Against Adversarial Machine Learning
  13. Altmetric Badge
    Chapter 12 Intrusion Detection and Classification with Autoencoded Deep Neural Network
  14. Altmetric Badge
    Chapter 13 Detecting Malicious Windows Commands Using Natural Language Processing Techniques
  15. Altmetric Badge
    Chapter 14 Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks
  16. Altmetric Badge
    Chapter 15 Assuring Privacy in Surfing the Internet
  17. Altmetric Badge
    Chapter 16 Roaming Interface Signaling Security for LTE Networks
  18. Altmetric Badge
    Chapter 17 Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile
  19. Altmetric Badge
    Chapter 18 Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
  20. Altmetric Badge
    Chapter 19 Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods
  21. Altmetric Badge
    Chapter 20 Trends in Design of Ransomware Viruses
  22. Altmetric Badge
    Chapter 21 Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers
  23. Altmetric Badge
    Chapter 22 Secure IoT Supply Chain Management Solution Using Blockchain and Smart Contracts Technology
  24. Altmetric Badge
    Chapter 23 ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology
  25. Altmetric Badge
    Chapter 24 Development of the Unified Security Requirements of PUFs During the Standardization Process
  26. Altmetric Badge
    Chapter 25 A PUF-Based Destructive Private Mutual Authentication RFID Protocol
  27. Altmetric Badge
    Chapter 26 Weakened Random Oracle Models with Target Prefix
  28. Altmetric Badge
    Chapter 27 An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields
  29. Altmetric Badge
    Chapter 28 On the Security of Jhanwar-Barua Identity-Based Encryption Scheme
  30. Altmetric Badge
    Chapter 29 Vulnerabilities of the McEliece Variants Based on Polar Codes
  31. Altmetric Badge
    Chapter 30 Binary Data Analysis for Source Code Leakage Assessment
  32. Altmetric Badge
    Chapter 31 Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks
  33. Altmetric Badge
    Chapter 32 A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib
  34. Altmetric Badge
    Chapter 33 A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption
  35. Altmetric Badge
    Chapter 34 Implementing Searchable Encryption Schemes over Multilinear Maps
  36. Altmetric Badge
    Chapter 35 A Unified Security Perspective on Legally Fair Contract Signing Protocols
  37. Altmetric Badge
    Chapter 36 Relating Different Polynomial-LWE Problems
  38. Altmetric Badge
    Chapter 37 Monoidal Encryption over $$(\mathbb {F}_2,\cdot )$$ ( F 2 , · )
  39. Altmetric Badge
    Chapter 38 Geometric Pairwise Key-Sharing Scheme
Attention for Chapter 31: Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks
Chapter number 31
Book title
Innovative Security Solutions for Information Technology and Communications
Published by
Springer, Cham, November 2018
DOI 10.1007/978-3-030-12942-2_31
Book ISBNs
978-3-03-012941-5, 978-3-03-012942-2
Authors

ZiHao Wang, ShuangHe Peng, XinYue Guo, WenBin Jiang, Wang, ZiHao, Peng, ShuangHe, Guo, XinYue, Jiang, WenBin

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 25%
Professor > Associate Professor 1 25%
Researcher 1 25%
Unknown 1 25%
Readers by discipline Count As %
Computer Science 2 50%
Unknown 2 50%