Billy Bob Brumley

Orcid: 0000-0001-9160-0463

Affiliations:
  • Rochester Institute of Technology, NY, USA
  • Tampere University, Finland (former)


According to our database1, Billy Bob Brumley authored at least 46 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
U Can Touch This! Microarchitectural Timing Attacks via Machine Clears.
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, 2025

2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024

2023
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
OpenSSLNTRU: Faster post-quantum TLS key exchange.
Proceedings of the 31st USENIX Security Symposium, 2022

HyperDegrade: From GHz to MHz Effective CPU Frequencies.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Online Template Attacks: Revisited.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Attestation Waves: Platform Trust via Remote Power Analysis.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

SoK: Remote Power Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
From A to Z: Projective coordinates leakage in the wild.
IACR Cryptol. ePrint Arch., 2020

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA.
IACR Cryptol. ePrint Arch., 2020

Certified Side Channels.
Proceedings of the 29th USENIX Security Symposium, 2020

Déjà Vu: Side-Channel Analysis of Mozilla's NSS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Set It and Forget It! Turnkey ECC for Instant Integration.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Memory Tampering Attack on Binary GCD Based Inversion Algorithms.
Int. J. Parallel Program., 2019

Port Contention for Fun and Profit.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Start Your ENGINEs: Dynamically Loadable Contemporary Crypto.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Batch Binary Weierstrass.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Triggerflow: Regression Testing by Advanced Execution Path Inspection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Cache-Timing Attacks on RSA Key Generation.
IACR Cryptol. ePrint Arch., 2018

Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Constant-Time Callees with Variable-Time Callers.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
"Make Sure DSA Signing Exponentiations Really are Constant-Time".
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Amplifying side channels through performance degradation.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
WHIRLBOB, the Whirlpool Based Variant of STRIBOB.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Faster Binary Curve Software: A Case Study.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Cache Storage Attacks.
Proceedings of the Topics in Cryptology, 2015

Faster Software for Fast Endomorphisms.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob.
IACR Cryptol. ePrint Arch., 2014

2013
Faster 128-EEA3 and 128-EIA3 Software.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Practical Realisation and Elimination of an ECC-Related Software Bug Attack.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Covert timing channels, caching, and cryptography.
PhD thesis, 2011

Remote Timing Attacks Are Still Practical.
Proceedings of the Computer Security - ESORICS 2011, 2011

Bit-Sliced Binary Normal Basis Multiplication.
Proceedings of the 20th IEEE Symposium on Computer Arithmetic, 2011

2010
Conversion Algorithms and Implementations for Koblitz Curve Cryptography.
IEEE Trans. Computers, 2010

Secure and Fast Implementations of Two Involution Ciphers.
Proceedings of the Information Security Technology for Applications, 2010

Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

New Results on Instruction Cache Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Cache-Timing Template Attacks.
Proceedings of the Advances in Cryptology, 2009

On Modular Decomposition of Integers.
Proceedings of the Progress in Cryptology, 2009

2008
Fast Point Decompression for Standard Elliptic Curves.
Proceedings of the Public Key Infrastructure, 2008

Implementing Cryptography for Packet Level Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Koblitz Curves and Integer Equivalents of Frobenius Expansions.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Differential Properties of Elliptic Curves and Blind Signatures.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Left-to-Right Signed-Bit <i>tau</i>-Adic Representations of <i>n</i> Integers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...