Berk Gülmezoglu

Orcid: 0000-0001-6268-6325

According to our database1, Berk Gülmezoglu authored at least 16 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
MAD-EN: Microarchitectural Attack Detection Through System-Wide Energy Consumption.
IEEE Trans. Inf. Forensics Secur., 2023

Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2022

DF-SCA: Dynamic Frequency Side Channel Attacks are Practical.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2019
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning.
CoRR, 2019

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Undermining User Privacy on Mobile Devices Using AI.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2017
Cache-Base Application Detection in the Cloud Using Machine Learning.
IACR Cryptol. ePrint Arch., 2017

PerfWeb: How to Violate Web Privacy with Hardware Performance Events.
Proceedings of the Computer Security - ESORICS 2017, 2017

Cache-Based Application Detection in the Cloud Using Machine Learning.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Cross-VM Cache Attacks on AES.
IEEE Trans. Multi Scale Comput. Syst., 2016

Cache Attacks Enable Bulk Key Recovery on the Cloud.
IACR Cryptol. ePrint Arch., 2016

Co-location detection on the Cloud.
IACR Cryptol. ePrint Arch., 2016

2015
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud.
IACR Cryptol. ePrint Arch., 2015

A Faster and More Realistic Flush+Reload Attack on AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015


  Loading...