Daniel Genkin

Orcid: 0000-0003-2720-9288

Affiliations:
  • Georgia Tech, Atlanta, GA, USA
  • University of Pennsylvania, Philadelphia, PA, USA


According to our database1, Daniel Genkin authored at least 79 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks.
IACR Cryptol. ePrint Arch., 2024

Testing side-channel security of cryptographic implementations against future microarchitectures.
CoRR, 2024

2023
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
J. Cryptol., July, 2023

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives.
Proc. ACM Program. Lang., 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023

BunnyHop: Exploiting the Instruction Prefetcher.
Proceedings of the 32nd USENIX Security Symposium, 2023

Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Impostor Among US(B): Off-Path Injection Attacks on USB Communications.
Proceedings of the 32nd USENIX Security Symposium, 2023

Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries.
Proceedings of the 31st IEEE/ACM International Conference on Program Comprehension, 2023

CryptOpt: Automatic Optimization of Straightline Code.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

CacheFX: A Framework for Evaluating Cache Security.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Spectre Declassified: Reading from the Right Place at the Wrong Time.
IACR Cryptol. ePrint Arch., 2022

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
IACR Cryptol. ePrint Arch., 2022

Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts.
IACR Cryptol. ePrint Arch., 2022

CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives.
CoRR, 2022

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Proceedings of the 31st USENIX Security Symposium, 2022

SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Side-Channeling the Kalyna Key Expansion.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Browser Based Side-Channel Defenses Datasets.
Dataset, October, 2021

Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses].
IEEE Secur. Priv., 2021

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.
Proceedings of the 30th USENIX Security Symposium, 2021

CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

Spectre attacks: exploiting speculative execution.
Commun. ACM, 2020

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

RAMBleed: Reading Bits in Memory Without Accessing Them.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
IACR Cryptol. ePrint Arch., 2019

Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
IACR Cryptol. ePrint Arch., 2018

Drive-by Key-Extraction Cache Attacks from Portable Code.
IACR Cryptol. ePrint Arch., 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Closure Under Reversal of Languages over Infinite Alphabets.
Proceedings of the Computer Science - Theory and Applications, 2018

Best of Both Worlds in Secure Computation, with Low Communication Overhead.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Acoustic Cryptanalysis.
J. Cryptol., 2017

CacheBleed: a timing attack on OpenSSL constant-time RSA.
J. Cryptogr. Eng., 2017

A Zero-Knowledge Version of vSQL.
IACR Cryptol. ePrint Arch., 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptol. ePrint Arch., 2017

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
IACR Cryptol. ePrint Arch., 2017

How to Construct a Leakage-Resilient (Stateless) Trusted Party.
IACR Cryptol. ePrint Arch., 2017

Sliding right into disaster: Left-to-right sliding windows leak.
IACR Cryptol. ePrint Arch., 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Secure Computation in Hostile Environments.
PhD thesis, 2016

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
IACR Cryptol. ePrint Arch., 2016

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
IACR Cryptol. ePrint Arch., 2016

Binary AMD Circuits from Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2016

Computational integrity with a public random string from quasi-linear PCPs.
IACR Cryptol. ePrint Arch., 2016

Physical key extraction attacks on PCs.
Commun. ACM, 2016

2015
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version.
J. Cryptogr. Eng., 2015

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
IACR Cryptol. ePrint Arch., 2015

Circuits Resilient to Additive Attacks with Applications to Secure Computation.
IACR Cryptol. ePrint Arch., 2015

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
A note on the emptiness problem for alternating finite-memory automata.
Theor. Comput. Sci., 2014

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
IACR Cryptol. ePrint Arch., 2014

2013
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
IACR Cryptol. ePrint Arch., 2013

SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
IACR Cryptol. ePrint Arch., 2013

On the concrete efficiency of probabilistically-checkable proofs.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems.
IACR Cryptol. ePrint Arch., 2012

On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs.
Electron. Colloquium Comput. Complex., 2012

2010
Extending Free Pregroups with Lower Bounds.
Stud Logica, 2010

Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars.
Proceedings of the Time for Verification, 2010


  Loading...