Artykuły udostępnione publicznie: - Yuval YaromWięcej informacji
Dostępne w jakimś miejscu: 62
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
IEEE Symposium on Security and Privacy, 2019
Upoważnienia: US National Science Foundation, US Department of Defense, European Commission
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
USENIX Security Symposium, 973-990, 2018
Upoważnienia: US National Science Foundation, US Department of Defense, European Commission
Last-Level Cache Side-Channel Attacks are Practical
F Liu, Y Yarom, Q Ge, G Heiser, RB Lee
IEEE Symposium on Security and Privacy (S&P), 2015
Upoważnienia: Australian Research Council
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
USENIX Security Symposium, 991-1008, 2018
Upoważnienia: US National Science Foundation, US Department of Defense, Research …
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Q Ge, Y Yarom, D Cock, G Heiser
Journal of Cryptographic Engineering 8 (1), 1-27, 2018
Upoważnienia: Australian Research Council
CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
F Liu, Q Ge, Y Yarom, F Mckeen, C Rozas, G Heiser, RB Lee
22nd IEEE Symposium on High Performance Computer Architecture (HPCA 2016), 2016
Upoważnienia: US National Science Foundation, Australian Research Council
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
CCS, 2019
Upoważnienia: US National Science Foundation, US Department of Defense, Research …
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
Journal of Cryptographic Engineering 7 (2), 99-112, 2017
Upoważnienia: US National Science Foundation
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
IEEE SP 2020, 2020
Upoważnienia: US National Science Foundation, US Department of Defense, Australian …
Another flip in the wall of Rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
IEEE Symposium on Security and Privacy (S&P), 2018
Upoważnienia: US National Science Foundation, US Department of Defense, European Commission
“Ooh Aah... Just a Little Bit”: A small amount of side channel can go a long way
N Benger, J van de Pol, NP Smart, Y Yarom
Cryptographic Hardware and Embedded Systems (CHES 2014), 75-92, 2014
Upoważnienia: UK Engineering and Physical Sciences Research Council, European Commission
Flush, Gauss, and reload–a cache attack on the BLISS lattice-based signature scheme
L Groot Bruinderink, A Hülsing, T Lange, Y Yarom
Cryptographic Hardware and Embedded Systems (CHES 2016), 2016
Upoważnienia: European Commission
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
23rd ACM Conference on Computer and Communications Security (CCS 2016), 2016
Upoważnienia: US National Science Foundation, Australian Research Council
CacheOut: Leaking data on Intel CPUs via cache evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
IEEE SP, 2021
Upoważnienia: US National Science Foundation, US Department of Defense, Australian …
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
A Shusterman, Z Avraham, E Croitoru, Y Haskal, L Kang, D Levi, ...
IEEE Transactions on Dependable and Secure Computing, 2020
Upoważnienia: US National Science Foundation, Australian Research Council
Mapping the Intel Last-Level Cache
Y Yarom, Q Ge, F Liu, RB Lee, G Heiser
IACR Cryptology ePrint Archive 2015-905, 2015
Upoważnienia: Australian Research Council
Amplifying Side Channels Through Performance Degradation
T Allan, BB Brumley, K Falkner, J van de Pol, Y Yarom
Annual Computer Security Applications Conference (ACSAC) 2016, 2016
Upoważnienia: Finnish Funding Agency for Innovation, UK Engineering and Physical Sciences …
SGAxe: How SGX Fails in Practice
S van Schaik, A Kwong, D Genkin, Y Yarom
Upoważnienia: US National Science Foundation, US Department of Defense, Australian …
To BLISS-B or not to be-Attacking strongSwan's Implementation of Post-Quantum Signatures
P Pessl, L Groot Bruinderink, Y Yarom
24th ACM Conference on Computer and Communications Security (CCS 2017), 2017
Upoważnienia: European Commission
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (2 …, 2018
Upoważnienia: US National Science Foundation, US Department of Defense
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy