Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.1
Monkbot (talk | contribs)
m Task 18 (cosmetic): eval 25 templates: del empty params (27×); hyphenate params (5×);
Line 200:
 
=== Acoustic ===
* {{cite book| last1 = Asonov | first1 =D. | title =IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 | last2 = Agrawal | first2 = R. | periodical = Proceedings 2004 IEEE Symposium on Security and Privacy | volume = | pages = 3–11 | citeseerx = 10.1.1.89.8231 | year = 2004 | issn = 1081-6011 | doi = 10.1109/SECPRI.2004.1301311 | isbn = 978-0-7695-2136-7 | ref = Aso1 | chapter =Keyboard acoustic emanations }}
* {{Citation| last1 = Zhuang | first1 = Li | last2 = Zhou | first2 = Feng | last3 = Tygar | first3 = J.D. | title = Keyboard acoustic emanations revisited | booktitlebook-title = ACM Transactions on Information and System Security (TISSEC) | periodical = Proceedings of the 12th ACM Conference on Computer and Communications Security | place = Alexandria, Virginia, USA | volume = 13 | issue = 1 | pages = 373–382 | publisher = ACM New York, NY, USA | citeseerx = 10.1.1.117.5791 | year = 2005 | issn = 1094-9224 | doi = 10.1145/1609956.1609959 | isbn = 978-1-59593-226-6 | ref = Zhu1 }}
* {{cite book| last1 = Berger | first1 = Yigael | title = Proceedings of the 13th ACM conference on Computer and communications security – CCS '06 | last2 = Wool | first2 = Avishai | last3 = Yeredor | first3 = Arie | periodical = Proceedings of the 13th ACM Conference on Computer and Communications Security | pages = 245–254 | place = Alexandria, Virginia, USA | citeseerx = 10.1.1.99.8028 | publisher = ACM New York, NY, USA | year = 2006 | doi = 10.1145/1180405.1180436 | isbn = 978-1-59593-518-2 | ref = Ber1| chapter = Dictionary attacks using keyboard acoustic emanations }}
* {{Citation| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Gerling | first3 = Sebastian | last4 = Pinkal | first4 = Manfred | last5 = Sporleder | first5 = Caroline | title = Acoustic Side-Channel Attacks on Printers | periodical = Proceedings of the 19th USENIX Security Symposium | place = Washington, DC| url = http://www.usenix.org/events/sec10/tech/full_papers/Backes.pdf | year = 2010 | isbn = 978-1-931971-77-5 | ref = Back1 }}
 
=== Cache attack ===
* {{cite book| last1 = Osvik | first1 = Dag Arne | title = Topics in Cryptology – CT-RSA 2006 | last2 = Shamir | first2 = Adi | last3 = Tromer | first3 = Eran | booktitlebook-title = Lecture Notes in Computer Science | volume = 3860 | pages = 1–20 | periodical = Topics in Cryptology CT-RSA | publisher = Springer-Verlag Berlin, Heidelberg | place = San Jose, California, USA | citeseerx = 10.1.1.60.1857 | year = 2006 | issn = 0302-9743 | doi = 10.1007/11605805_1 | isbn = 978-3-540-31033-4 | ref = Sha1| chapter = Cache Attacks and Countermeasures: The Case of AES | series = Lecture Notes in Computer Science }}
* {{Citation| last1 = Page | first1 = Daniel | title = Partitioned cache architecture as a side-channel defence mechanism | periodical = Cryptology ePrint Archive | url = http://eprint.iacr.org/2005/280.pdf | year = 2005 | ref = Pag1 }}
* {{cite book| last1 = Bertoni | first1 = Guido | title = International Conference on Information Technology: Coding and Computing (ITCC'05) – Volume II | last2 = Zaccaria | first2 = Vittorio | last3 = Breveglieri | first3 = Luca | last4 = Monchiero | first4 = Matteo | last5 = Palermo | first5 = Gianluca | place = Washington, DC, USA | volume = 1 | pages = 586–591 | periodical = International Conference on Information Technology: Coding and Computing (ITCC'05) | publisher = IEEE Computer Society, Los Alamitos, California, USA | chapter-url = http://home.dei.polimi.it/gpalermo/papers/ITCC05.pdf | year = 2005 | doi = 10.1109/ITCC.2005.62 | isbn = 978-0-7695-2315-6 | ref = Bert1 | chapter = AES power attack based on induced cache miss and countermeasure | citeseerx = 10.1.1.452.3319 }}
Line 215:
=== Electromagnetic ===
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Information Hiding | volume = 1525 | last2 = Anderson | first2 = Ross J. | pages = 124–142 | periodical = Lecture Notes in Computer Science | year = 1998 | doi = 10.1007/3-540-49380-8_10 | isbn = 978-3-540-65386-8 | ref = Kuhn1| chapter = Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations | series = Lecture Notes in Computer Science | citeseerx = 10.1.1.64.6982 }}
* {{Citation| last1 = Van Eck | first1 = Wim | last2 = Laborato | first2 = Neher | title = Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | volume = 4 | issue = 4 | pages = 269–286 | periodical = Computers & Security | url = http://portal.acm.org/citation.cfm?id=7308 | year = 1985 | doi = 10.1016/0167-4048(85)90046-X | isbn = | ref = Eck1 | citeseerx = 10.1.1.35.1695 }}
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |chapter-url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-1543-4 | ref = Kuhn2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 }}
* {{Citation| last1 = Vuagnoux | first1 = Martin | last2 = Pasini | first2 = Sylvain | title = Compromising electromagnetic emanations of wired and wireless keyboards | pages = 1–16 | periodical = In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09) | url = http://www.usenix.org/events/sec09/tech/full_papers/vuagnoux.pdf | year = 2009 | ref = Vuag1}}
Line 221:
 
=== FireWire ===
* {{Citation| last1 = Dornseif | first1 = Maximillian | title = 0wned by an iPod | pages = | periodical = PacSec | place = | url = http://pi1.informatik.uni-mannheim.de/filepool/publications/13.pdf | year = 2004 | doi = | isbn = | ref = Dorn1 }}
* {{Citation | last1 = Dornseif | first1 = Maximillian | title = FireWire all your memory are belong to us | periodical = CanSecWest | url = http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | year = 2005 | ref = Dorn2 | access-date = 2010-12-17 | archive-url = https://web.archive.org/web/20091229032404/http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | archive-date = 2009-12-29 | url-status = dead }}
 
=== Processor bug and backdoors ===
* {{cite book| last1 = Duflot | first1 = Loïc | title = Computer Security - ESORICS 2008 | volume = 5283| pages = 580–599 | periodical = ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security | ___location = | year = 2008 | issn = | doi = 10.1007/978-3-540-88313-5_37 | isbn = 978-3-540-88312-8 | accessdate = | ref = Dufl2| chapter = CPU Bugs, CPU Backdoors and Consequences on Security | series = Lecture Notes in Computer Science }}
* {{Citation | last1 = Duflot | first1 = Loïc | title = Using CPU System Management Mode to Circumvent Operating System Security Functions | pages = 580–599 | periodical = Proceedings of CanSecWest | url = http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | year = 2008 | ref = Dufl3 | archive-url = https://web.archive.org/web/20060526181027/http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | archive-date = 2006-05-26 | url-status = dead }}
* {{Citation | last1 = Waksman | first1 = Adam | title = Tamper Evident Microprocessors | volume = | pages = | periodical = Proceedings of the IEEE Symposium on Security and Privacy | ___location = Oakland, California | url = https://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | year = 2010 | issn = | doi = | isbn = | accessdate = | ref = Waks1 | archive-url = https://web.archive.org/web/20130921055451/https://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | archive-date = 2013-09-21 | url-status = dead }}
 
=== Temperature ===
* {{Citation| last1 = Skorobogatov| first1 = Sergei | title = Low temperature data remanence in static RAM | journal = Technical Report - University of Cambridge. Computer Laboratory | publisher = University of Cambridge Computer Laboratory | place = Cambridge, UK| url = http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf | year = 2002 | issn = 1476-2986 | ref = Sko1}}
* {{Citation | last1 = Halderman | first1 = J. Alex | last2 = Schoen | first2 = Seth D. | last3 = Heninger | first3 = Nadia | author3-link = Nadia Heninger | last4 = Clarkson | first4 = William | last5 = Paul | first5 = William | last6 = Calandrino | first6 = Joseph A. | last7 = Feldman | first7 = Ariel J. | last8 = Appelbaum | first8 = Jacob | last9 = Felten | first9 = Edward W. | title = Lest We Remember: Cold Boot Attacks on Encryption Keys | booktitlebook-title = Communications of the ACM – Security in the Browser | volume = 52 | issue = 5 | pages = 45–60 | periodical = Proceedings of the USENIX Security Symposium | publisher = ACM New York, New York, USA | url = http://citp.princeton.edu/pub/coldboot.pdf | year = 2008 | issn = 0001-0782 | doi = 10.1145/1506409.1506429 | isbn = 978-1-931971-60-7 | ref = Hald1 | url-status = dead | archiveurlarchive-url = https://web.archive.org/web/20110904213748/http://citp.princeton.edu/pub/coldboot.pdf | archivedatearchive-date = 2011-09-04 }}
 
=== Timing attacks ===
* {{Citation| last1 = Song | first1 = Dawn Xiaodong | last2 = Wagner | first2 = David | last3 = Tian | first3 = Xuqing | title = Timing analysis of keystrokes and timing attacks on SSH | volume = 10 | pages = 337–352 | place = Washington, D.C., USA | periodical = Proceedings of the 10th Conference on USENIX Security Symposium | publisher = USENIX Association Berkeley, California, USA | url = http://www.usenix.org/events/sec01/full_papers/song/song.pdf | year = 2001 | issn = | doi = | isbn = | ref = Song1}}
* {{cite book| last1 = Kocher | first1 = Paul C.| title = Advances in Cryptology – CRYPTO '96| volume = 1109 | pages = 104–113 | periodical = Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology – CRYPTO '96 | series = Lecture Notes in Computer Science | publisher = Springer-Verlag, London, UK | place = Santa Barbara, California, USA | citeseerx = 10.1.1.40.5024 | year = 1996 | doi = 10.1007/3-540-68697-5_9 | isbn = 978-3-540-61512-5 | ref = Koch1| chapter = Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems}}
* {{Citation| last1 = Brumley | first1 = David | last2 = Boneh | first2 = Dan | title = Remote timing attacks are practical | volume = 12 | issue = 5 | pages = 701 | periodical = Proceedings of the 12th Conference on USENIX Security Symposium SSYM'03 | publisher = USENIX Association Berkeley, California, USA | place = Washington, DC, USA | url = http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf | year = 2003 | doi = 10.1016/j.comnet.2005.01.010 | ref = Brum1| citeseerx = 10.1.1.12.2615 }}
 
=== Other ===
* {{cite book| last1 = Balzarotti | first1 = D.| title = 2008 IEEE Symposium on Security and Privacy (sp 2008)| last2 = Cova| first2 = M.| last3 = Vigna| first3 = G.| volume = | pages = 170–183 | periodical = Security and Privacy, 2008. SP 2008. IEEE Symposium on | ___location = Oakland, CA | year = 2008 | issn = 1081-6011 | doi = 10.1109/SP.2008.28 | isbn = 978-0-7695-3168-7 | ref = Balz1| chapter = Clear ''Shot'': Eavesdropping on Keyboard Input from Video| citeseerx = 10.1.1.219.239}}
* {{Citation| language = fr | last1 = Duflot | first1 = Loïc | title = Contribution à la sécurité des systèmes d'exploitation et des microprocesseurs | volume = | pages = | periodical = | ___location = | url = http://www.ssi.gouv.fr/archive/fr/sciences/fichiers/lti/these-duflot.pdf | year = 2007 | issn = | doi = | isbn = | accessdate = | ref = Dufl1}}
 
{{Computer science}}