


Остановите войну!
for scientists:


default search action
Jakub Szefer
Person information

- affiliation: Yale University, New Haven, CT, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j19]Ferhat Erata
, Shuwen Deng
, Faisal Zaghloul
, Wenjie Xiong
, Onur Demir
, Jakub Szefer
:
Survey of Approaches and Techniques for Security Verification of Computer Systems. ACM J. Emerg. Technol. Comput. Syst. 19(1): 6:1-6:34 (2023) - [j18]Ferhat Erata
, Eren Yildiz
, Arda Goknil
, Kasim Sinan Yildirim
, Jakub Szefer
, Ruzica Piskac
, Gökçin Sezgin
:
ETAP: Energy-aware Timing Analysis of Intermittent Programs. ACM Trans. Embed. Comput. Syst. 22(2): 23:1-23:31 (2023) - [j17]Florian Frank
, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul
, Farinaz Koushanfar
, Stefan Katzenbeisser
, Ulrich Rührmair, Jakub Szefer
:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. IEEE Trans. Inf. Forensics Secur. 18: 2991-3005 (2023) - [j16]Ilias Giechaskiel
, Shanquan Tian
, Jakub Szefer
:
Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs. ACM Trans. Reconfigurable Technol. Syst. 16(1): 6:1-6:29 (2023) - [c75]Chuanqi Xu
, Jakub Szefer
:
Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers. ARES 2023: 32:1-32:6 - [c74]Chuanqi Xu
, Ferhat Erata
, Jakub Szefer
:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. CCS 2023: 579-593 - [c73]Chuanqi Xu
, Jessie Chen
, Allen Mi
, Jakub Szefer
:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. CCS 2023: 594-607 - [c72]Shanquan Tian, Shayan Moini, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
A Practical Remote Power Attack on Machine Learning Accelerators in Cloud FPGAs. DATE 2023: 1-6 - [c71]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. EuroS&P 2023: 687-706 - [c70]Jalil Morris
, Anisul Abedin
, Chuanqi Xu
, Jakub Szefer
:
Fingerprinting Quantum Computer Equipment. ACM Great Lakes Symposium on VLSI 2023: 117-123 - [c69]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding
, Jakub Szefer:
Design of Quantum Computer Antivirus. HOST 2023: 260-270 - [c68]Kaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker, Jakub Szefer, Frederic T. Chong:
Fast Fingerprinting of Cloud-based NISQ Quantum Computers. HOST 2023: 271-282 - [i31]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. CoRR abs/2304.02102 (2023) - [i30]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Quantum Computer Power Side-Channels. CoRR abs/2304.03315 (2023) - [i29]Sanjay Deshpande, Jakub Szefer:
Analyzing ChatGPT's Aptitude in an Introductory Computer Engineering Course. CoRR abs/2304.06122 (2023) - [i28]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Security Evaluation of Thermal Covert-channels on SmartSSDs. CoRR abs/2305.09115 (2023) - [i27]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
Hardware Architecture for a Quantum Computer Trusted Execution Environment. CoRR abs/2308.03897 (2023) - [i26]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Classification of Quantum Computer Fault Injection Attacks. CoRR abs/2309.05478 (2023) - [i25]Jerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer:
Extending and Defending Attacks on Reset Operations in Quantum Computers. CoRR abs/2309.06281 (2023) - 2022
- [j15]Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. ACM Comput. Surv. 54(3): 54:1-54:36 (2022) - [j14]Shuwen Deng
, Nikolay Matyunin, Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. IEEE Trans. Computers 71(9): 2248-2262 (2022) - [j13]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr
, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 71-113 (2022) - [j12]Christophe Bobda
, Joel Mandebi Mbongue
, Paul Chow
, Mohammad Ewais, Naif Tarafdar
, Juan Camilo Vega
, Ken Eguro
, Dirk Koch
, Suranga Handagala, Miriam Leeser
, Martin C. Herbordt, Hafsah Shahzad, Peter Hofste, Burkhard Ringlein
, Jakub Szefer
, Ahmed Sanaullah, Russell Tessier
:
The Future of FPGA Acceleration in Datacenters and the Cloud. ACM Trans. Reconfigurable Technol. Syst. 15(3): 34:1-34:42 (2022) - [c67]Allen Mi
, Shuwen Deng, Jakub Szefer
:
Securing Reset Operations in NISQ Quantum Computers. CCS 2022: 2279-2293 - [c66]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding
, Jakub Szefer:
Towards an Antivirus for Quantum Computers. HOST 2022: 37-40 - [c65]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Security Vulnerabilities in Processor Frontends. HPCA 2022: 53-66 - [i24]Allen Mi, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. CoRR abs/2202.12731 (2022) - [i23]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding, Jakub Szefer:
Towards an Antivirus for Quantum Computers. CoRR abs/2203.02649 (2022) - [i22]Florian Frank
, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. CoRR abs/2208.02125 (2022) - [i21]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Cryptol. ePrint Arch. 2022: 412 (2022) - [i20]Sanjay Deshpande, Mamuri Nawan, Kashif Nawaz, Jakub Szefer, Chuanqi Xu:
Towards a Fast and Efficient Hardware Implementation of HQC. IACR Cryptol. ePrint Arch. 2022: 1183 (2022) - 2021
- [j11]Wenjie Xiong
, André Schaller, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
:
DRAM PUFs in Commodity Devices. IEEE Des. Test 38(3): 76-83 (2021) - [j10]Shayan Moini
, Shanquan Tian
, Daniel E. Holcomb
, Jakub Szefer
, Russell Tessier
:
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 357-370 (2021) - [j9]Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. IEEE Secur. Priv. 19(3): 42-49 (2021) - [j8]Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches. IEEE Trans. Computers 70(4): 511-523 (2021) - [c64]Jonathon Durand, Anisul Abedin, Jakub Szefer:
Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits. AsianHOST 2021: 1-6 - [c63]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. CRYPTO (3) 2021: 402-431 - [c62]Shuwen Deng, Jakub Szefer:
New Predictor-Based Attacks in Processors. DAC 2021: 697-702 - [c61]Shayan Moini, Shanquan Tian, Daniel E. Holcomb, Jakub Szefer, Russell Tessier
:
Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs. DATE 2021: 1639-1644 - [c60]Obi Nnorom, Jalil Morris, Ilias Giechaskiel, Jakub Szefer:
Chill Out: Freezing Attacks on Capacitors and DC/DC Converters. ETS 2021: 1-2 - [c59]Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong, Jakub Szefer:
Cloud FPGA Cartography using PCIe Contention. FCCM 2021: 224-232 - [c58]Shanquan Tian, Shayan Moini, Adam Wolnikowski, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
Remote Power Attacks on the Versatile Tensor Accelerator in Multi-Tenant FPGAs. FCCM 2021: 242-246 - [c57]Sanjay Deshpande, Santos Merino Del Pozo
, Víctor Mateu
, Marc Manzano, Najwa Aaraj, Jakub Szefer:
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications. FPL 2021: 122-129 - [c56]Julia Burgiel, Daniel E. Holcomb, Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Characterization of IOBUF-based Ring Oscillators. FPT 2021: 1-4 - [c55]Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments. HOST 2021: 91-101 - [c54]Allen Mi
, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. HASP@MICRO 2021: 7:1-7:6 - [c53]Jalil Morris, Obi Nnorom, Anisul Abedin, Ferhat Erata
, Jakub Szefer:
Deep Freezing Attacks on Capacitors and Electronic Circuits. SPACE 2021: 188-203 - [i19]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Micro-Op Cache and Processor Frontend Vulnerabilities. CoRR abs/2105.12224 (2021) - [i18]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. CoRR abs/2106.14054 (2021) - 2020
- [j7]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [j6]Wenjie Xiong
, André Schaller
, Stefan Katzenbeisser, Jakub Szefer
:
Software Protection Using Dynamic PUFs. IEEE Trans. Inf. Forensics Secur. 15: 2053-2068 (2020) - [c52]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. ASPLOS 2020: 683-697 - [c51]Jakub Szefer:
Thermal and Voltage Side and Covert Channels and Attacks in Cloud FPGAs. FPGA 2020: 22 - [c50]Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c49]Changsu Kim
, Yongwoo Lee, Shinnung Jeong, Wen Wang, Jakub Szefer, Hanjun Kim:
Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms. FPGA 2020: 310 - [c48]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. HPCA 2020: 139-152 - [c47]Ilias Giechaskiel, Jakub Szefer:
Information Leakage from FPGA Routing and Logic Elements. ICCAD 2020: 63:1-63:9 - [c46]Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, Ken Mai:
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS. ICCD 2020: 656-662 - [c45]Shanquan Tian, Andrew Krzywosz, Ilias Giechaskiel, Jakub Szefer:
Cloud FPGA Security with RO-Based Primitives. FPT 2020: 154-158 - [c44]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. SP 2020: 1728-1741 - [e3]Jakub Szefer, Weidong Shi, Ruby B. Lee:
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. ACM 2020, ISBN 978-1-4503-8898-6 [contents] - [i17]Wenjie Xiong, Jakub Szefer
:
Survey of Transient Execution Attacks. CoRR abs/2005.13435 (2020) - [i16]Shayan Moini, Shanquan Tian, Jakub Szefer
, Daniel E. Holcomb, Russell Tessier:
Remote Power Side-Channel Attacks on CNN Accelerators in FPGAs. CoRR abs/2011.07603 (2020) - [i15]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020) - [i14]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. IACR Cryptol. ePrint Arch. 2020: 1457 (2020)
2010 – 2019
- 2019
- [j5]Sebastian Lins, Stephan Schneider, Jakub Szefer, Shafeeq Ibraheem, Ali Sunyaev:
Designing Monitoring Systems for Continuous Certification of Cloud Services: Deriving Meta-requirements and Design Guidelines. Commun. Assoc. Inf. Syst. 44: 25 (2019) - [j4]Jakub Szefer
:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. J. Hardw. Syst. Secur. 3(3): 219-234 (2019) - [j3]Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. J. Hardw. Syst. Secur. 3(4): 397-425 (2019) - [j2]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c43]Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Spying on Temperature using DRAM. DATE 2019: 13-18 - [c42]Shanquan Tian, Jakub Szefer:
Temporal Thermal Covert Channels in Cloud FPGAs. FPGA 2019: 298-303 - [c41]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs. FPL 2019: 45-50 - [c40]Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Dynamic Physically Unclonable Functions. ACM Great Lakes Symposium on VLSI 2019: 311-314 - [c39]Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. ICCD 2019: 1-10 - [c38]Shanquan Tian, Wen Wang, Jakub Szefer:
Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern. FPT 2019: 126-134 - [c37]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Sercan Sari, Y. Serhan Gener
, Corine Lu, Onur Demir
, Jakub Szefer:
SecChisel Framework for Security Verification of Secure Processor Architectures. HASP@ISCA 2019: 7:1-7:8 - [c36]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Secure TLBs. ISCA 2019: 346-359 - [c35]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems. SAC 2019: 523-550 - [c34]Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. TrustCom/BigDataSE 2019: 319-326 - [c33]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. WPES@CCS 2019: 135-149 - [i13]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. CoRR abs/1902.04444 (2019) - [i12]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. CoRR abs/1905.08348 (2019) - [i11]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. CoRR abs/1906.11117 (2019) - [i10]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. CoRR abs/1911.08619 (2019) - [i9]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 167 (2019) - 2018
- [b1]Jakub Szefer:
Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture, Morgan & Claypool Publishers 2018, ISBN 978-3-031-00632-6 - [j1]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld
, André Schaller, Wenjie Xiong
, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer
, Jakub Szefer
, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Cryptogr. 2(3): 13 (2018) - [c32]Wen Wang, Jakub Szefer, Ruben Niederhagen:
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract. ACM Great Lakes Symposium on VLSI 2018: 371 - [c31]Nikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser:
Zero-permission acoustic cross-device tracking. HOST 2018: 25-32 - [c30]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Cache timing side-channel vulnerability checking with computation tree logic. HASP@ISCA 2018: 2:1-2:8 - [c29]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-Based Niederreiter Cryptosystem Using Binary Goppa Codes. PQCrypto 2018: 77-98 - [e2]Jakub Szefer, Weidong Shi, Ruby B. Lee:
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018. ACM 2018 [contents] - [i8]Jakub Szefer
, Tianwei Zhang, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. CoRR abs/1807.01854 (2018) - [i7]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V. IACR Cryptol. ePrint Arch. 2018: 1225 (2018) - 2017
- [c28]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes. CHES 2017: 253-274 - [c27]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. HOST 2017: 1-7 - [i6]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer:
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. IACR Cryptol. ePrint Arch. 2017: 193 (2017) - [i5]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes. IACR Cryptol. ePrint Arch. 2017: 595 (2017) - [i4]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes. IACR Cryptol. ePrint Arch. 2017: 1180 (2017) - 2016
- [c26]Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, Stefan Katzenbeisser:
Covert channels using mobile device's magnetic field sensors. ASP-DAC 2016: 525-532 - [c25]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. CHES 2016: 432-453 - [c24]Ji-Yong Shin
, Mahesh Balakrishnan, Tudor Marian, Jakub Szefer, Hakim Weatherspoon:
Towards Weakly Consistent Local Storage Systems. SoCC 2016: 294-306 - [c23]Sumedh Guha, Wen Wang, Shafeeq Ibraheem, Mahesh Balakrishnan, Jakub Szefer:
Design and implementation of open-source SATA III core for Stratix V FPGAs. FPT 2016: 237-240 - [c22]Wen Wang, Jakub Szefer, Ruben Niederhagen:
Solving large systems of linear equations over GF(2) on FPGAs. ReConFig 2016: 1-7 - [i3]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Practical DRAM PUFs in Commodity Devices. IACR Cryptol. ePrint Arch. 2016: 253 (2016) - [i2]Jakub Szefer:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. IACR Cryptol. ePrint Arch. 2016: 479 (2016) - [i1]Onur Demir, Wenjie Xiong, Faisal Zaghloul, Jakub Szefer:
Survey of Approaches for Security Verification of Hardware/Software Systems. IACR Cryptol. ePrint Arch. 2016: 846 (2016) - 2015
- [c21]Jakub Szefer:
Leveraging Processor Performance Counters for Security and Performance. TrustED@CCS 2015: 41 - [c20]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496 - [c19]Junaid Nomani, Jakub Szefer:
Predicting program phases and defending against side-channel attacks using hardware performance counters. HASP@ISCA 2015: 9:1-9:4 - [e1]Ruby B. Lee, Weidong Shi, Jakub Szefer:
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN 978-1-4503-3483-9 [contents] - 2014
- [c18]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15 - [c17]Sebastian Jeuk, Jakub Szefer, Shi Zhou
:
Towards Cloud, Service and Tenant Classification for Cloud Computing. CCGRID 2014: 792-801 - [c16]Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee:
Cyber defenses for physical attacks and insider threats in cloud computing. AsiaCCS 2014: 519-524 - [c15]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014 - [c14]Jakub Szefer, Sebastian Biedermann:
Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8 - [c13]Sebastian Biedermann, Jakub Szefer:
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290 - [p1]Jakub Szefer, Ruby B. Lee:
Hardware-Enhanced Security for Cloud Computing. Secure Cloud Computing 2014: 57-76 - 2013
- [c12]