default search action
Yuval Yarom
Person information
- affiliation: Ruhr University Bochum, Germany
- affiliation (former, PhD 2014): The University of Adelaide, School of Computer Science, Adelaide, SA, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j13]Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom:
TeeJam: Sub-Cache-Line Leakages Strike Back. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 457-500 (2024) - [j12]Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 224-248 (2024) - [c65]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN Architecture Extraction on Edge GPU. ACNS Workshops (1) 2024: 158-175 - [c64]William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu:
SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? AsiaCCS 2024 - [c63]Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman:
SoK: SGX.Fail: How Stuff Gets eXposed. SP 2024: 4143-4162 - [c62]Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom:
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism. USENIX Security Symposium 2024 - [c61]Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom:
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome. USENIX Security Symposium 2024 - [i58]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN architecture extraction on edge GPU. CoRR abs/2401.13575 (2024) - [i57]Jiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko:
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget. CoRR abs/2401.17628 (2024) - [i56]Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom:
Testing side-channel security of cryptographic implementations against future microarchitectures. CoRR abs/2402.00641 (2024) - [i55]Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. IACR Cryptol. ePrint Arch. 2024: 149 (2024) - [i54]Gal Horowitz, Eyal Ronen, Yuval Yarom:
Spec-o-Scope: Cache Probing at Cache Speed. IACR Cryptol. ePrint Arch. 2024: 775 (2024) - [i53]Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang:
Protecting cryptographic code against Spectre-RSB. IACR Cryptol. ePrint Arch. 2024: 1070 (2024) - 2023
- [j11]Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. Comput. J. 66(6): 1335-1341 (2023) - [j10]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives. Proc. ACM Program. Lang. 7(PLDI): 1268-1292 (2023) - [c60]Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom:
CacheFX: A Framework for Evaluating Cache Security. AsiaCCS 2023: 163-176 - [c59]Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices. CCS 2023: 2038-2052 - [c58]Joel Kuepper, David Wu, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Automatic Optimization of Straightline Code. ICSE Companion 2023: 141-145 - [c57]Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. SP 2023: 1753-1770 - [c56]Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom:
The Gates of Time: Improving Cache Attacks with Transient Execution. USENIX Security Symposium 2023: 1955-1972 - [c55]Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom:
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. USENIX Security Symposium 2023: 5863-5880 - [c54]Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs. USENIX Security Symposium 2023: 6275-6292 - [c53]Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom:
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. USENIX Security Symposium 2023: 7107-7124 - [c52]Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom:
Ultimate SLH: Taking Speculative Load Hardening to the Next Level. USENIX Security Symposium 2023: 7125-7142 - [c51]Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom:
BunnyHop: Exploiting the Instruction Prefetcher. USENIX Security Symposium 2023: 7321-7337 - [i52]Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs. CoRR abs/2305.12784 (2023) - [i51]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Automatic Optimization of Straightline Code. CoRR abs/2305.19586 (2023) - [i50]Robert Dumitru, Andrew Wabnitz, Yuval Yarom:
On Borrowed Time - Preventing Static Power Side-Channel Analysis. CoRR abs/2307.09001 (2023) - [i49]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs. CoRR abs/2312.07783 (2023) - [i48]Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom:
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information. IACR Cryptol. ePrint Arch. 2023: 1536 (2023) - 2022
- [c50]Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom:
RSA Key Recovery from Digit Equivalence Information. ACNS 2022: 193-211 - [c49]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770 - [c48]Yuval Yarom:
Automating Cryptographic Code Generation. ASHES@CCS 2022: 3 - [c47]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561 - [c46]Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang:
Side-Channeling the Kalyna Key Expansion. CT-RSA 2022: 272-296 - [c45]Chitchanok Chuengsatiansup, Markus Wagner, Yuval Yarom:
Opportunities for genetic improvement of cryptographic code. GECCO Companion 2022: 1928-1929 - [c44]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. NDSS 2022 - [c43]Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom:
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. SP 2022: 699-715 - [i47]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting. CoRR abs/2201.09956 (2022) - [i46]Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom:
CacheFX: A Framework for Evaluating Cache Security. CoRR abs/2201.11377 (2022) - [i45]Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom:
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. CoRR abs/2211.01109 (2022) - [i44]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives. CoRR abs/2211.10665 (2022) - [i43]Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. IACR Cryptol. ePrint Arch. 2022: 426 (2022) - [i42]Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom:
Breaking and Fixing Speculative Load Hardening. IACR Cryptol. ePrint Arch. 2022: 715 (2022) - 2021
- [j9]Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. IEEE Secur. Priv. 19(1): 95-98 (2021) - [j8]Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. IEEE Trans. Dependable Secur. Comput. 18(5): 2042-2060 (2021) - [c42]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699 - [c41]Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic:
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. EuroS&P 2021: 507-522 - [c40]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021 - [c39]Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. SP 2021: 339-354 - [c38]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. USENIX Security Symposium 2021: 2863-2880 - [d2]Anatoly Shusterman, Ayush Agrawal, Giorgio Maone, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Browser Based Side-Channel Defenses Datasets. IEEE DataPort, 2021 - [i41]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. CoRR abs/2103.04952 (2021) - [i40]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021) - [i39]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CoRR abs/2109.11741 (2021) - [i38]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. IACR Cryptol. ePrint Arch. 2021: 497 (2021) - [i37]Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. IACR Cryptol. ePrint Arch. 2021: 828 (2021) - [i36]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. IACR Cryptol. ePrint Arch. 2021: 1181 (2021) - [i35]Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom:
RSA Key Recovery from Digit Equivalence Information. IACR Cryptol. ePrint Arch. 2021: 1558 (2021) - 2020
- [j7]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j6]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j5]Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao:
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 231-255 (2020) - [c37]Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. CCS 2020: 225-242 - [c36]Michelle McClintock, Katrina Falkner, Claudia Szabo, Yuval Yarom:
Enterprise Security Architecture: Mythology or Methodology? ICEIS (2) 2020: 679-689 - [c35]Michelle Graham, Katrina Falkner, Claudia Szabo, Yuval Yarom:
Security Architecture Framework for Enterprises. ICEIS (Revised Selected Papers) 2020: 883-904 - [c34]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [c33]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c32]Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom:
RAMBleed: Reading Bits in Memory Without Accessing Them. SP 2020: 695-711 - [c31]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. SP 2020: 1241-1258 - [c30]Andrew Feutrill, Matthew Roughan, Joshua Ross, Yuval Yarom:
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities. TPS-ISA 2020: 1-11 - [e2]Yuval Yarom, Sarah Zennou:
14th USENIX Workshop on Offensive Technologies, WOOT 2020, August 11, 2020. USENIX Association 2020 [contents] - [i34]Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. CoRR abs/2006.13353 (2020) - [i33]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020) - [i32]Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. IACR Cryptol. ePrint Arch. 2020: 615 (2020)
2010 – 2019
- 2019
- [j4]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. IEEE Micro 39(3): 66-74 (2019) - [c29]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c28]Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser:
Time Protection: The Missing OS Abstraction. EuroSys 2019: 1:1-1:17 - [c27]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c26]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c25]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. USENIX Security Symposium 2019: 639-656 - [d1]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltzer, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting - Last Level Cache Contention Traces. IEEE DataPort, 2019 - [i31]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - [i30]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. CoRR abs/1912.05183 (2019) - [i29]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IACR Cryptol. ePrint Arch. 2019: 996 (2019) - [i28]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. IACR Cryptol. ePrint Arch. 2019: 1445 (2019) - 2018
- [j3]Qian Ge, Yuval Yarom, David A. Cock, Gernot Heiser:
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 8(1): 1-27 (2018) - [j2]Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 171-191 (2018) - [c24]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-By Key-Extraction Cache Attacks from Portable Code. ACNS 2018: 83-102 - [c23]Qian Ge, Yuval Yarom, Gernot Heiser:
No Security Without Time Protection: We Need a New Hardware-Software Contract. APSys 2018: 1:1-1:9 - [c22]Andrew Feutrill, Dinesha Ranathunga, Yuval Yarom, Matthew Roughan:
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay. CANDAR 2018: 1-10 - [c21]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c20]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [c19]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991-1008 - [e1]Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom:
Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Lecture Notes in Computer Science 11348, Springer 2018, ISBN 978-3-030-05071-9 [contents] - [i27]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i26]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i25]Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser:
Time Protection: the Missing OS Abstraction. CoRR abs/1810.05345 (2018) - [i24]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. CoRR abs/1811.07153 (2018) - [i23]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. IACR Cryptol. ePrint Arch. 2018: 119 (2018) - [i22]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - [i21]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i20]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [j1]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptogr. Eng. 7(2): 99-112 (2017) - [c18]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. CCS 2017: 845-858 - [c17]Peter Pessl, Leon Groot Bruinderink, Yuval Yarom:
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures. CCS 2017: 1843-1855 - [c16]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. CHES 2017: 555-576 - [c15]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme After Deployment. EUROCRYPT (2) 2017: 499-527 - [c14]Yang Su, Daniel Genkin, Damith Chinthana Ranasinghe, Yuval Yarom:
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. USENIX Security Symposium 2017: 1145-1161 - [i19]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i18]Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. IACR Cryptol. ePrint Arch. 2017: 137 (2017) - [i17]Peter Pessl, Leon Groot Bruinderink, Yuval Yarom:
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures. IACR Cryptol. ePrint Arch. 2017: 490 (2017) - [i16]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding right into disaster: Left-to-right sliding windows leak. IACR Cryptol. ePrint Arch. 2017: 627 (2017) - [i15]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. IACR Cryptol. ePrint Arch. 2017: 806 (2017) - 2016
- [c13]Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom:
Amplifying side channels through performance degradation. ACSAC 2016: 422-435 - [c12]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. CCS 2016: 1626-1638 - [c11]Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:
"Make Sure DSA Signing Exponentiations Really are Constant-Time". CCS 2016: 1639-1650 - [c10]