Computer security paper
Paper list
Paper list
287
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks
Cloud
Micro-architectural attacks
Schedulers
Co-Location attacks
288
V-Range: Enabling Secure Ranging in 5G Wireless Networks
5G
Location
Frequency offset attack
488
A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks
Cellular Networks
LTE
5G
Location identification