Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks O Oleksenko, B Trach, R Krahn, A Martin, M Silberstein, C Fetzer 2018 USENIX Annual Technical Conference (USENIX ATC18), 227-240, 2018 | 302 | 2018 |
Intel mpx explained: A cross-layer analysis of the intel mpx system stack O Oleksenko, D Kuvaiskii, P Bhatotia, P Felber, C Fetzer Proceedings of the ACM on Measurement and Analysis of Computing Systems 2 (2 …, 2018 | 244* | 2018 |
SGXBOUNDS: Memory safety for shielded execution D Kuvaiskii, O Oleksenko, S Arnautov, B Trach, P Bhatotia, P Felber, ... Proceedings of the Twelfth European Conference on Computer Systems, 205-221, 2017 | 168 | 2017 |
{SpecFuzz}: Bringing spectre-type vulnerabilities to the surface O Oleksenko, B Trach, M Silberstein, C Fetzer 29th USENIX Security Symposium (USENIX Security 20), 1481-1498, 2020 | 118 | 2020 |
You shall not bypass: Employing data dependencies to prevent bounds check bypass O Oleksenko, B Trach, T Reiher, M Silberstein, C Fetzer arXiv preprint arXiv:1805.08506, 2018 | 61 | 2018 |
Clemmys: Towards secure remote execution in faas B Trach, O Oleksenko, F Gregor, P Bhatotia, C Fetzer Proceedings of the 12th ACM international conference on systems and storage …, 2019 | 49 | 2019 |
Revizor: Testing Black-box CPUs against Speculation Contracts O Oleksenko, C Fetzer, B Köpf, M Silberstein Proceedings of the 27th ACM International Conference on Architectural …, 2022 | 48 | 2022 |
Elzar: Triple modular redundancy using intel avx (practical experience report) D Kuvaiskii, O Oleksenko, P Bhatotia, P Felber, C Fetzer 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 31* | 2016 |
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing O Oleksenko, M Guarnieri, B Köpf, M Silberstein IEEE Symposium on Security and Privacy (S&P), 2023 | 30 | 2023 |
T-lease: A trusted lease primitive for distributed systems B Trach, R Faqeh, O Oleksenko, W Ozga, P Bhatotia, C Fetzer Proceedings Of The 11th ACM Symposium On Cloud Computing, 387-400, 2020 | 22 | 2020 |
Fex: A software systems evaluator O Oleksenko, D Kuvaiskii, P Bhatotia, C Fetzer 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 16 | 2017 |
Efficient fault tolerance using intel mpx and tsx O Oleksenko, D Kuvaiskii, P Bhatotia, C Fetzer, P Felber Fast Abstract in the 46th Annual IEEE/IFIP International Conference on …, 2016 | 12 | 2016 |
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions J Hofmann, E Vannacci, C Fournet, B Köpf, O Oleksenko Usenix Security, 2023 | 9 | 2023 |
Resiliency-aware Data Compression for In-memory Database Systems. T Kolditz, D Habich, P Damme, W Lehner, D Kuvaiskii, O Oleksenko, ... DATA, 326-331, 2015 | 4 | 2015 |
SIMD-Swift: Improving Performance of Swift Fault Detection O Oleksenko Saechsische Landesbibliothek-Staats-und Universitaetsbibliothek Dresden, 2016 | 2 | 2016 |
Principled microarchitectural isolation on cloud CPUs S Volos, C Fournet, J Hofmann, B Köpf, O Oleksenko Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 1 | 2024 |
Systems and methods utilizing hardware models to detect side-channel vulnerabilities in processor designs GKC MUNOZ, CW Shugg, AD Maycock, O Oleksenko, BA Koepf US Patent App. 18/214,960, 2025 | | 2025 |
AMuLeT: Automated Design-Time Testing of Secure Speculation Countermeasures B Fu, L Tenenbaum, D Adler, A Klein, A Gogia, AR Alameldeen, ... | | 2025 |
Maintaining Security in the Era of Microarchitectural Attacks O Oleksenko | | 2021 |