


default search action
Jakub Szefer
Person information
- affiliation: Yale University, New Haven, CT, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j24]Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Designing Secure TLBs. IEEE Des. Test 41(2): 39-46 (2024) - [j23]Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 215-251 (2024) - [j22]Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 735-768 (2024) - [j21]Theodoros Trochatos
, Anthony Etim
, Jakub Szefer
:
Covert-channels in FPGA-enabled SmartSSDs. ACM Trans. Reconfigurable Technol. Syst. 17(2): 27:1-27:23 (2024) - [c89]Lejla Batina
, Chip-Hong Chang
, Ulrich Rührmair
, Jakub Szefer
:
ASHES '24: Workshop on Attacks and Solutions in Hardware Security. CCS 2024: 4909-4910 - [c88]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. HOST 2024: 55-65 - [c87]Theodoros Trochatos, Sanjay Deshpande, Chuanqi Xu, Yao Lu, Yongshan Ding, Jakub Szefer:
Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds. HOST 2024: 404-414 - [c86]Jessie Chen, Jakub Szefer:
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures. HOST 2024: 415-419 - [c85]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
A Quantum Computer Trusted Execution Environment. HPCA 2024: 613 - [c84]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Quantum Computer Fault Injection Attacks. QCE 2024: 331-337 - [c83]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
Protecting Quantum Computers with a Trusted Controller. QCE 2024: 1143-1148 - [c82]Jessie Chen, Jakub Szefer:
Counting Bases from Number of Qubits: Inferring VRP from Quantum Circuits. QCE 2024: 1264-1269 - [c81]George Typaldos, Wei Tang, Jakub Szefer:
Leveraging Quantum Circuit Cutting for Obfuscation and Intellectual Property Protection. QCE 2024: 1824-1834 - [c80]Anthony Etim, Shanquan Tian, Jakub Szefer:
Extending FPGA Information Leaks with Trojan Phantom Circuits. SEED 2024: 1-10 - [c79]Jerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer:
Extending and Defending Attacks on Reset Operations in Quantum Computers. SEED 2024: 73-83 - [e4]Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer, Lejla Batina, Francesco Regazzoni:
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, ASHES 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1235-7 [contents] - [i41]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. CoRR abs/2401.15529 (2024) - [i40]Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. CoRR abs/2401.15869 (2024) - [i39]Ferhat Erata, Tinghung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer:
Systematic Use of Random Self-Reducibility against Physical Attacks. CoRR abs/2405.05193 (2024) - [i38]Chuanqi Xu, Jakub Szefer:
Jailbreaking Quantum Computers. CoRR abs/2406.05941 (2024) - [i37]Yizhuo Tan, Hrvoje Kukina, Jakub Szefer:
Study of Attacks on the HHL Quantum Algorithm. CoRR abs/2410.08010 (2024) - [i36]Anthony Etim, Jakub Szefer:
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification. CoRR abs/2410.08338 (2024) - [i35]Theodoros Trochatos, Jakub Szefer:
Quantum Operating System Support for Quantum Trusted Execution Environments. CoRR abs/2410.08486 (2024) - [i34]Anthony Etim, Jakub Szefer:
Fall Leaf Adversarial Attack on Traffic Sign Classification. CoRR abs/2411.18776 (2024) - [i33]Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. IACR Cryptol. ePrint Arch. 2024: 69 (2024) - 2023
- [j20]Theodoros Trochatos
, Chuanqi Xu
, Sanjay Deshpande
, Yao Lu, Yongshan Ding
, Jakub Szefer
:
A Quantum Computer Trusted Execution Environment. IEEE Comput. Archit. Lett. 22(2): 177-180 (2023) - [j19]Ferhat Erata
, Shuwen Deng
, Faisal Zaghloul
, Wenjie Xiong
, Onur Demir
, Jakub Szefer
:
Survey of Approaches and Techniques for Security Verification of Computer Systems. ACM J. Emerg. Technol. Comput. Syst. 19(1): 6:1-6:34 (2023) - [j18]Ferhat Erata
, Eren Yildiz
, Arda Goknil
, Kasim Sinan Yildirim
, Jakub Szefer
, Ruzica Piskac
, Gökçin Sezgin
:
ETAP: Energy-aware Timing Analysis of Intermittent Programs. ACM Trans. Embed. Comput. Syst. 22(2): 23:1-23:31 (2023) - [j17]Florian Frank
, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul
, Farinaz Koushanfar
, Stefan Katzenbeisser
, Ulrich Rührmair, Jakub Szefer
:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. IEEE Trans. Inf. Forensics Secur. 18: 2991-3005 (2023) - [j16]Ilias Giechaskiel
, Shanquan Tian
, Jakub Szefer
:
Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs. ACM Trans. Reconfigurable Technol. Syst. 16(1): 6:1-6:29 (2023) - [c78]Chuanqi Xu
, Jakub Szefer
:
Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers. ARES 2023: 32:1-32:6 - [c77]Chuanqi Xu
, Ferhat Erata
, Jakub Szefer
:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. CCS 2023: 579-593 - [c76]Chuanqi Xu
, Jessie Chen
, Allen Mi
, Jakub Szefer
:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. CCS 2023: 594-607 - [c75]Shanquan Tian, Shayan Moini, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
A Practical Remote Power Attack on Machine Learning Accelerators in Cloud FPGAs. DATE 2023: 1-6 - [c74]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. EuroS&P 2023: 687-706 - [c73]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Covert-channels in FPGA-enabled SmartSSDs. ICFPT 2023: 2 - [c72]Jalil Morris
, Anisul Abedin
, Chuanqi Xu
, Jakub Szefer
:
Fingerprinting Quantum Computer Equipment. ACM Great Lakes Symposium on VLSI 2023: 117-123 - [c71]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding
, Jakub Szefer:
Design of Quantum Computer Antivirus. HOST 2023: 260-270 - [c70]Kaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker, Jakub Szefer, Frederic T. Chong:
Fast Fingerprinting of Cloud-based NISQ Quantum Computers. HOST 2023: 271-282 - [c69]Sanjay Deshpande
, Chuanqi Xu
, Mamuri Nawan
, Kashif Nawaz
, Jakub Szefer
:
Fast and Efficient Hardware Implementation of HQC. SAC 2023: 297-321 - [i32]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. CoRR abs/2304.02102 (2023) - [i31]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Quantum Computer Power Side-Channels. CoRR abs/2304.03315 (2023) - [i30]Sanjay Deshpande, Jakub Szefer:
Analyzing ChatGPT's Aptitude in an Introductory Computer Engineering Course. CoRR abs/2304.06122 (2023) - [i29]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Security Evaluation of Thermal Covert-channels on SmartSSDs. CoRR abs/2305.09115 (2023) - [i28]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
Hardware Architecture for a Quantum Computer Trusted Execution Environment. CoRR abs/2308.03897 (2023) - [i27]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Classification of Quantum Computer Fault Injection Attacks. CoRR abs/2309.05478 (2023) - [i26]Jerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer:
Extending and Defending Attacks on Reset Operations in Quantum Computers. CoRR abs/2309.06281 (2023) - 2022
- [j15]Wenjie Xiong
, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. ACM Comput. Surv. 54(3): 54:1-54:36 (2022) - [j14]Shuwen Deng
, Nikolay Matyunin, Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. IEEE Trans. Computers 71(9): 2248-2262 (2022) - [j13]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr
, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 71-113 (2022) - [j12]Christophe Bobda
, Joel Mandebi Mbongue
, Paul Chow
, Mohammad Ewais, Naif Tarafdar
, Juan Camilo Vega
, Ken Eguro
, Dirk Koch
, Suranga Handagala, Miriam Leeser
, Martin C. Herbordt, Hafsah Shahzad, H. Peter Hofstee, Burkhard Ringlein
, Jakub Szefer
, Ahmed Sanaullah, Russell Tessier
:
The Future of FPGA Acceleration in Datacenters and the Cloud. ACM Trans. Reconfigurable Technol. Syst. 15(3): 34:1-34:42 (2022) - [c68]Allen Mi
, Shuwen Deng, Jakub Szefer
:
Securing Reset Operations in NISQ Quantum Computers. CCS 2022: 2279-2293 - [c67]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding
, Jakub Szefer:
Towards an Antivirus for Quantum Computers. HOST 2022: 37-40 - [c66]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Security Vulnerabilities in Processor Frontends. HPCA 2022: 53-66 - [i25]Ferhat Erata, Arda Goknil, Eren Yildiz, Kasim Sinan Yildirim, Ruzica Piskac, Jakub Szefer, Gökçin Sezgin:
ETAP: Energy-aware Timing Analysis of Intermittent Programs. CoRR abs/2201.11433 (2022) - [i24]Allen Mi, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. CoRR abs/2202.12731 (2022) - [i23]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding, Jakub Szefer:
Towards an Antivirus for Quantum Computers. CoRR abs/2203.02649 (2022) - [i22]Florian Frank
, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. CoRR abs/2208.02125 (2022) - [i21]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Cryptol. ePrint Arch. 2022: 412 (2022) - [i20]Sanjay Deshpande, Mamuri Nawan, Kashif Nawaz, Jakub Szefer, Chuanqi Xu:
Towards a Fast and Efficient Hardware Implementation of HQC. IACR Cryptol. ePrint Arch. 2022: 1183 (2022) - 2021
- [j11]Wenjie Xiong
, André Schaller, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
:
DRAM PUFs in Commodity Devices. IEEE Des. Test 38(3): 76-83 (2021) - [j10]Shayan Moini
, Shanquan Tian
, Daniel E. Holcomb
, Jakub Szefer
, Russell Tessier
:
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 357-370 (2021) - [j9]Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. IEEE Secur. Priv. 19(3): 42-49 (2021) - [j8]Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches. IEEE Trans. Computers 70(4): 511-523 (2021) - [c65]Jonathon Durand, Anisul Abedin, Jakub Szefer:
Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits. AsianHOST 2021: 1-6 - [c64]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. CRYPTO (3) 2021: 402-431 - [c63]Shuwen Deng, Jakub Szefer:
New Predictor-Based Attacks in Processors. DAC 2021: 697-702 - [c62]Shayan Moini, Shanquan Tian, Daniel E. Holcomb, Jakub Szefer, Russell Tessier
:
Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs. DATE 2021: 1639-1644 - [c61]Obi Nnorom, Jalil Morris, Ilias Giechaskiel, Jakub Szefer:
Chill Out: Freezing Attacks on Capacitors and DC/DC Converters. ETS 2021: 1-2 - [c60]Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong
, Jakub Szefer:
Cloud FPGA Cartography using PCIe Contention. FCCM 2021: 224-232 - [c59]Shanquan Tian, Shayan Moini, Adam Wolnikowski, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
Remote Power Attacks on the Versatile Tensor Accelerator in Multi-Tenant FPGAs. FCCM 2021: 242-246 - [c58]Sanjay Deshpande, Santos Merino Del Pozo
, Víctor Mateu
, Marc Manzano, Najwa Aaraj, Jakub Szefer:
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications. FPL 2021: 122-129 - [c57]Julia Burgiel, Daniel E. Holcomb, Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Characterization of IOBUF-based Ring Oscillators. FPT 2021: 1-4 - [c56]Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments. HOST 2021: 91-101 - [c55]Tianwei Zhang, Jakub Szefer, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. HASP@MICRO 2021: 2:1-2:9 - [c54]Allen Mi
, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. HASP@MICRO 2021: 7:1-7:6 - [c53]Jalil Morris, Obi Nnorom, Anisul Abedin, Ferhat Erata
, Jakub Szefer:
Deep Freezing Attacks on Capacitors and Electronic Circuits. SPACE 2021: 188-203 - [i19]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Micro-Op Cache and Processor Frontend Vulnerabilities. CoRR abs/2105.12224 (2021) - [i18]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. CoRR abs/2106.14054 (2021) - 2020
- [j7]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel
, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [j6]Wenjie Xiong
, André Schaller
, Stefan Katzenbeisser, Jakub Szefer
:
Software Protection Using Dynamic PUFs. IEEE Trans. Inf. Forensics Secur. 15: 2053-2068 (2020) - [c52]Shuwen Deng, Wenjie Xiong
, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. ASPLOS 2020: 683-697 - [c51]Jakub Szefer:
Thermal and Voltage Side and Covert Channels and Attacks in Cloud FPGAs. FPGA 2020: 22 - [c50]Shanquan Tian, Wenjie Xiong
, Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c49]Changsu Kim
, Yongwoo Lee
, Shinnung Jeong
, Wen Wang, Jakub Szefer, Hanjun Kim:
Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms. FPGA 2020: 310 - [c48]Wenjie Xiong
, Jakub Szefer:
Leaking Information Through Cache LRU States. HPCA 2020: 139-152 - [c47]Ilias Giechaskiel, Jakub Szefer:
Information Leakage from FPGA Routing and Logic Elements. ICCAD 2020: 63:1-63:9 - [c46]Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, Ken Mai:
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS. ICCD 2020: 656-662 - [c45]Shanquan Tian, Andrew Krzywosz, Ilias Giechaskiel, Jakub Szefer:
Cloud FPGA Security with RO-Based Primitives. FPT 2020: 154-158 - [c44]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. SP 2020: 1728-1741 - [e3]Jakub Szefer, Weidong Shi, Ruby B. Lee:
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. ACM 2020, ISBN 978-1-4503-8898-6 [contents] - [i17]Wenjie Xiong, Jakub Szefer
:
Survey of Transient Execution Attacks. CoRR abs/2005.13435 (2020) - [i16]Shayan Moini, Shanquan Tian, Jakub Szefer
, Daniel E. Holcomb, Russell Tessier:
Remote Power Side-Channel Attacks on CNN Accelerators in FPGAs. CoRR abs/2011.07603 (2020) - [i15]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020) - [i14]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. IACR Cryptol. ePrint Arch. 2020: 1457 (2020)
2010 – 2019
- 2019
- [j5]Sebastian Lins, Stephan Schneider, Jakub Szefer, Shafeeq Ibraheem, Ali Sunyaev:
Designing Monitoring Systems for Continuous Certification of Cloud Services: Deriving Meta-requirements and Design Guidelines. Commun. Assoc. Inf. Syst. 44: 25 (2019) - [j4]Jakub Szefer
:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. J. Hardw. Syst. Secur. 3(3): 219-234 (2019) - [j3]Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. J. Hardw. Syst. Secur. 3(4): 397-425 (2019) - [j2]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c43]Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Spying on Temperature using DRAM. DATE 2019: 13-18 - [c42]Shanquan Tian, Jakub Szefer:
Temporal Thermal Covert Channels in Cloud FPGAs. FPGA 2019: 298-303 - [c41]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs. FPL 2019: 45-50 - [c40]Wenjie Xiong
, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Dynamic Physically Unclonable Functions. ACM Great Lakes Symposium on VLSI 2019: 311-314 - [c39]Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. ICCD 2019: 1-10 - [c38]Shanquan Tian, Wen Wang, Jakub Szefer:
Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern. FPT 2019: 126-134 - [c37]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong
, Sercan Sari, Y. Serhan Gener
, Corine Lu, Onur Demir
, Jakub Szefer:
SecChisel Framework for Security Verification of Secure Processor Architectures. HASP@ISCA 2019: 7:1-7:8 - [c36]Shuwen Deng, Wenjie Xiong
, Jakub Szefer:
Secure TLBs. ISCA 2019: 346-359 - [c35]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems. SAC 2019: 523-550 - [c34]Shuai Chen, Wenjie Xiong
, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. TrustCom/BigDataSE 2019: 319-326 - [c33]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. WPES@CCS 2019: 135-149 - [i13]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. CoRR abs/1902.04444 (2019) - [i12]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. CoRR abs/1905.08348 (2019) - [i11]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. CoRR abs/1906.11117 (2019) - [i10]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. CoRR abs/1911.08619 (2019) - [i9]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 167 (2019) - 2018
- [b1]Jakub Szefer:
Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture, Morgan & Claypool Publishers 2018, ISBN 978-3-031-00632-6 - [j1]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld
, André Schaller
, Wenjie Xiong
, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer
, Jakub Szefer
, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Cryptogr. 2(3): 13 (2018) - [c32]Wen Wang, Jakub Szefer, Ruben Niederhagen:
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract. ACM Great Lakes Symposium on VLSI 2018: 371 - [c31]