Daniel Genkin

According to our database1, Daniel Genkin authored at least 50 papers between 2010 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
CoRR, 2020

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
CoRR, 2020

Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
IACR Cryptol. ePrint Arch., 2019

Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

Spectre Attacks: Exploiting Speculative Execution.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
IACR Cryptol. ePrint Arch., 2018

Drive-by Key-Extraction Cache Attacks from Portable Code.
IACR Cryptol. ePrint Arch., 2018

Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Closure Under Reversal of Languages over Infinite Alphabets.
Proceedings of the Computer Science - Theory and Applications, 2018

Best of Both Worlds in Secure Computation, with Low Communication Overhead.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Acoustic Cryptanalysis.
J. Cryptology, 2017

CacheBleed: a timing attack on OpenSSL constant-time RSA.
J. Cryptographic Engineering, 2017

A Zero-Knowledge Version of vSQL.
IACR Cryptol. ePrint Arch., 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptol. ePrint Arch., 2017

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
IACR Cryptol. ePrint Arch., 2017

How to Construct a Leakage-Resilient (Stateless) Trusted Party.
IACR Cryptol. ePrint Arch., 2017

Sliding right into disaster: Left-to-right sliding windows leak.
IACR Cryptol. ePrint Arch., 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
IACR Cryptol. ePrint Arch., 2016

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
IACR Cryptol. ePrint Arch., 2016

Binary AMD Circuits from Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2016

Computational integrity with a public random string from quasi-linear PCPs.
IACR Cryptol. ePrint Arch., 2016

Physical key extraction attacks on PCs.
Commun. ACM, 2016

2015
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version.
J. Cryptographic Engineering, 2015

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
IACR Cryptol. ePrint Arch., 2015

Circuits Resilient to Additive Attacks with Applications to Secure Computation.
IACR Cryptol. ePrint Arch., 2015

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
A note on the emptiness problem for alternating finite-memory automata.
Theor. Comput. Sci., 2014

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
IACR Cryptol. ePrint Arch., 2014

2013
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2013

On the concrete efficiency of probabilistically-checkable proofs.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems.
IACR Cryptol. ePrint Arch., 2012

On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs.
Electronic Colloquium on Computational Complexity (ECCC), 2012

2010
Extending Free Pregroups with Lower Bounds.
Studia Logica, 2010

Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars.
Proceedings of the Time for Verification, 2010


  Loading...