Gorka Irazoqui Apecechea

According to our database1, Gorka Irazoqui Apecechea authored at least 21 papers between 2014 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
MASCAT: Preventing Microarchitectural Attacks Before Distribution.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

CacheShield: Detecting Cache Attacks through Self-Observation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
CacheZoom: How SGX Amplifies The Power of Cache Attacks.
IACR Cryptol. ePrint Arch., 2017

CacheShield: Protecting Legacy Processes Against Cache Attacks.
CoRR, 2017

Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries.
CoRR, 2017

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Cross-VM Cache Attacks on AES.
IEEE Trans. Multi Scale Comput. Syst., 2016

MASCAT: Stopping Microarchitectural Attacks Before Execution.
IACR Cryptol. ePrint Arch., 2016

Cache Attacks Enable Bulk Key Recovery on the Cloud.
IACR Cryptol. ePrint Arch., 2016

Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Know Thy Neighbor: Crypto Library Detection in Cloud.
Proc. Priv. Enhancing Technol., 2015

Cross Processor Cache Attacks.
IACR Cryptol. ePrint Arch., 2015

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud.
IACR Cryptol. ePrint Arch., 2015

Systematic Reverse Engineering of Cache Slice Selection in Intel Processors.
IACR Cryptol. ePrint Arch., 2015

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

A Faster and More Realistic Flush+Reload Attack on AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Lucky 13 Strikes Back.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Wait a minute! A fast, Cross-VM attack on AES.
IACR Cryptol. ePrint Arch., 2014

Fine grain Cross-VM Attacks on Xen and VMware are possible!
IACR Cryptol. ePrint Arch., 2014

Jackpot Stealing Information From Large Caches via Huge Pages.
IACR Cryptol. ePrint Arch., 2014

Fine Grain Cross-VM Attacks on Xen and VMware.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014


  Loading...