David Kohlbrenner

Affiliations:
  • University of Washington, Seattle, WA, USA


According to our database1, David Kohlbrenner authored at least 17 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
IEEE Micro, 2023

Pentimento: Data Remanence in Cloud FPGAs.
CoRR, 2023

Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
Proceedings of the 32nd USENIX Security Symposium, 2023

DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Verifying RISC-V Physical Memory Protection.
CoRR, 2022

Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

2020
Building Open Trusted Execution Environments.
IEEE Secur. Priv., 2020

Keystone: an open framework for architecting trusted execution environments.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

2019
Sanctorum: A lightweight security monitor for secure enclaves.
IACR Cryptol. ePrint Arch., 2019

Keystone: A Framework for Architecting TEEs.
CoRR, 2019

2018
Trusted Systems for Uncertain Times.
PhD thesis, 2018

2017
On the effectiveness of mitigations against floating-point timing channels.
Proceedings of the 26th USENIX Security Symposium, 2017

Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Trusted Browsers for Uncertain Times.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
On Subnormal Floating Point and Abnormal Timing.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2013
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013


  Loading...