Notice

This item has not yet been validated by imec staff.

Notice

This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/37752.2

Show simple item record

dc.contributor.authorVan Goethem, Tom
dc.contributor.authorPopper, Christina
dc.contributor.authorJoosen, Wouter
dc.contributor.authorVanhoef, Mathy
dc.date.accessioned2021-11-02T15:59:26Z
dc.date.available2021-11-02T15:59:26Z
dc.date.issued2020
dc.identifier.otherWOS:000668146200112
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/37752
dc.sourceWOS
dc.titleTimeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
dc.typeProceedings paper
dc.identifier.eisbn978-1-939133-17-5
dc.source.numberofpages18
dc.source.peerreviewyes
dc.source.beginpage1985
dc.source.endpage2002
dc.source.conference29th USENIX Security Symposium
dc.source.conferencedateAUG 12-14, 2020
imec.availabilityUnder review


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version