Segui
Andrew Kwong
Andrew Kwong
Email verificata su cs.unc.edu - Home page
Titolo
Citata da
Citata da
Anno
RAMBleed: Reading Bits in Memory Without Accessing Them
A Kwong, D Genkin, D Gruss, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
2452020
CacheOut: Leaking data on Intel CPUs via cache evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
42nd IEEE Symposium on Security and Privacy (S&P), 2021
1892021
SGAxe: How SGX fails in practice
S Van Schaik, A Kwong, D Genkin, Y Yarom
2020. https://sgaxe. com/files/SGAxe. pdf, 2020
134*2020
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
A Kwong, W Xu, K Fu
40th IEEE Symposium on Security and Privacy (S&P), 2019
692019
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
43rd IEEE Symposium on Security and Privacy (S&P), 2022
672022
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
39th IEEE Symposium on Security and Privacy (S&P), 2018
532018
Pseudorandom Black Swans: Cache Attacks on CTR DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
492020
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
29th ACM Conference on Computer and Communications Security (CCS), 2022
452022
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
USENIX Security Symposium (USENIX Security), 2024
72024
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
USENIX Security Symposium (USENIX Security), 2024
62024
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ...
ASPLOS (ACM International Conference on Architectural Support for …, 2024
52024
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detection Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
USENIX Security Symposium (USENIX Security), 2023
12023
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos
A Kwong, C Bolton, T Trippel, W Xu, K Fu
12017
PQ-Hammer: End-to-end Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer
S Amer, Y Wang, H Kippen, T Dang, D Genkin, A Kwong, A Nelson, ...
2025 IEEE Symposium on Security and Privacy (SP), 48-48, 2025
2025
Applying Software-Based Side-Channels to Hardware Vulnerabilities
A Kwong
2023
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16