Content deleted Content added
Citation bot (talk | contribs) m Alter: isbn, title, periodical. Add: citeseerx, chapter-url. Removed parameters. | You can use this bot yourself. Report bugs here. | User-activated. |
|||
Line 203:
=== Acoustic ===
* {{cite book| last1 = Asonov | first1 =D. | title =IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 | last2 = Agrawal | first2 = R. | periodical = Proceedings 2004 IEEE Symposium on Security and Privacy | volume = | pages = 3–11 | citeseerx = 10.1.1.89.8231 | year = 2004 | issn = 1081-6011 | doi = 10.1109/SECPRI.2004.1301311 | isbn = 978-0-7695-2136-
* {{Citation| last1 = Zhuang | first1 = Li | last2 = Zhou | first2 = Feng | last3 = Tygar | first3 = J.D. | title = Keyboard acoustic emanations revisited | booktitle = ACM Transactions on Information and System Security (TISSEC) | periodical = Proceedings of the 12th ACM Conference on Computer and Communications Security | place = Alexandria, Virginia, USA | volume = 13 | issue = 1 | pages = 373–382 | publisher = ACM New York, NY, USA | citeseerx = 10.1.1.117.5791 | year = 2005 | issn = 1094-9224 | doi = 10.1145/1609956.1609959 | isbn = 978-1-59593-226-
* {{cite book| last1 = Berger | first1 = Yigael | title = Proceedings of the 13th ACM conference on Computer and communications security
* {{Citation| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Gerling | first3 = Sebastian | last4 = Pinkal | first4 = Manfred | last5 = Sporleder | first5 = Caroline | title = Acoustic Side-Channel Attacks on Printers | periodical = Proceedings of the 19th
=== Cache attack ===
* {{cite book| last1 = Osvik | first1 = Dag Arne | title = Topics in Cryptology – CT-RSA 2006 | last2 = Shamir | first2 = Adi | last3 = Tromer | first3 = Eran | booktitle = Lecture Notes in Computer Science | volume = 3860 | pages = 1–20 | periodical = Topics in Cryptology CT-RSA | publisher = Springer-Verlag Berlin, Heidelberg | place = San Jose, California, USA | citeseerx = 10.1.1.60.1857 | year = 2006 | issn = 0302-9743 | doi = 10.1007/11605805_1 | isbn = 978-3-540-31033-
* {{Citation| last1 = Page | first1 = Daniel | title = Partitioned cache architecture as a side-channel defence mechanism | periodical = Cryptology ePrint Archive | url = http://eprint.iacr.org/2005/280.pdf | year = 2005 | ref = Pag1 }}
* {{cite book| last1 = Bertoni | first1 = Guido | title = International Conference on Information Technology: Coding and Computing (ITCC'05) – Volume II | last2 = Zaccaria | first2 = Vittorio | last3 = Breveglieri | first3 = Luca | last4 = Monchiero | first4 = Matteo | last5 = Palermo | first5 = Gianluca | place = Washington, DC, USA | volume = 1 | pages = 586–591 | periodical = International Conference on Information Technology: Coding and Computing (ITCC'05) | publisher = IEEE Computer Society, Los Alamitos, California, USA | chapter-url = http://home.dei.polimi.it/gpalermo/papers/ITCC05.pdf | year = 2005 | doi = 10.1109/ITCC.2005.62 | isbn = 978-0-7695-2315-
=== Chemical ===
* {{Citation| last1 = Gutmann | first1 = Peter | title = Data Remanence in Semiconductor Devices | volume = 10 | pages = 4 | periodical = Proceedings of the 10th
=== Electromagnetic ===
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Information Hiding | volume = 1525 | last2 = Anderson | first2 = Ross J. | pages = 124–142 | periodical = Lecture Notes in Computer Science | chapter-url = http://www.springerlink.com/content/dm6kgf2p4mnrp0uv/ | year = 1998 | doi = 10.1007/3-540-49380-8_10 | isbn = 978-3-540-65386-
* {{Citation| last1 = Van Eck | first1 = Wim | last2 = Laborato | first2 = Neher | title = Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | volume = 4 | issue = 4 | pages = 269–286 | periodical = Computers & Security | url = http://portal.acm.org/citation.cfm?id=7308 | year = 1985 | doi = 10.1016/0167-4048(85)90046-X | isbn = | ref = Eck1 | citeseerx = 10.1.1.35.1695 }}
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |chapter-url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-1543-
* {{Citation| last1 = Vuagnoux | first1 = Martin | last2 = Pasini | first2 = Sylvain | title = Compromising electromagnetic emanations of wired and wireless keyboards | pages = 1–16 | periodical = In Proceedings of the 18th
* {{cite book| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Unruh | first3 = Dominique | title = Compromising Reflections-or-How to Read LCD Monitors around the Corner | pages = 158–169 | periodical = Proceedings of the IEEE Symposium on Security and Privacy | place = Oakland, California, USA | chapter-url = http://crypto.m2ci.org/unruh/publications/reflections.pdf | year = 2008 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-3168-7 | ref = Back2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 }}
=== FireWire ===
Line 228:
=== Processor bug and backdoors ===
* {{cite book| last1 = Duflot | first1 = Loïc | title = Computer Security - ESORICS 2008 | volume = 5283| pages = 580–599 | periodical = ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security | ___location = | chapter-url = http://www.springerlink.com/index/jp07870p24560678.pdf | year = 2008 | issn = | doi = 10.1007/978-3-540-88313-5_37 | isbn = 978-3-540-88312-8 | accessdate = | ref = Dufl2| chapter = CPU Bugs, CPU Backdoors and Consequences on Security | series = Lecture Notes in Computer Science }}
* {{Citation| last1 = Duflot | first1 = Loïc | title = Using CPU System Management Mode to Circumvent Operating System Security Functions | volume = | pages = 580–599 | periodical = Proceedings of CanSecWest | ___location = | url = http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | year = 2008 | issn = | doi = | isbn = | accessdate = | ref = Dufl3}}
* {{Citation| last1 = Waksman | first1 = Adam | title = Tamper Evident Microprocessors | volume = | pages = | periodical = Proceedings of the IEEE Symposium on Security and Privacy | ___location = Oakland, California | url = http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | year = 2010 | issn = | doi = | isbn = | accessdate = | ref = Waks1}}
Line 237:
=== Timing attacks ===
* {{Citation| last1 = Song | first1 = Dawn Xiaodong | last2 = Wagner | first2 = David | last3 = Tian | first3 = Xuqing | title = Timing analysis of keystrokes and timing attacks on SSH | volume = 10 | pages = 337–352 | place = Washington, D.C., USA | periodical = Proceedings of the 10th
* {{cite book| last1 = Kocher | first1 = Paul C.| title = Advances in Cryptology – CRYPTO '96| volume = 1109 | pages = 104–113 | periodical = Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology – CRYPTO '96 | series = Lecture Notes in Computer Science | publisher = Springer-Verlag, London, UK | place = Santa Barbara, California, USA | citeseerx = 10.1.1.40.5024 | year = 1996 | doi = 10.1007/3-540-68697-5_9 | isbn = 978-3-540-61512-
* {{Citation| last1 = Brumley | first1 = David | last2 = Boneh | first2 = Dan | title = Remote timing attacks are practical | volume = 12 | issue = 5 | pages = 701 | periodical = Proceedings of the 12th
=== Other ===
* {{cite book| last1 = Balzarotti | first1 = D.| title = 2008 IEEE Symposium on Security and Privacy (sp 2008)| last2 = Cova| first2 = M.| last3 = Vigna| first3 = G.| volume = | pages = 170–183 | periodical = Security and Privacy, 2008. SP 2008. IEEE Symposium on | ___location = Oakland, CA | chapter-url = http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4531152 | year = 2008 | issn = 1081-6011 | doi = 10.1109/SP.2008.28 | isbn = 978-0-7695-3168-7 | accessdate = | ref = Balz1| chapter = Clear ''Shot'': Eavesdropping on Keyboard Input from Video| citeseerx = 10.1.1.219.239}}
* {{Citation| language = fr | last1 = Duflot | first1 = Loïc | title = Contribution à la sécurité des systèmes
[[Category:Computer security]]
|