Ilias Giechaskiel

Orcid: 0000-0002-3700-2742

According to our database1, Ilias Giechaskiel authored at least 24 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs.
ACM Trans. Reconfigurable Technol. Syst., March, 2023

2022
Long-Wire Leakage: The Threat of Crosstalk.
IEEE Des. Test, 2022

2021
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

Characterization of IOBUF-based Ring Oscillators.
Proceedings of the International Conference on Field-Programmable Technology, 2021

Cloud FPGA Cartography using PCIe Contention.
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021

Chill Out: Freezing Attacks on Capacitors and DC/DC Converters.
Proceedings of the 26th IEEE European Test Symposium, 2021

Extended Abstract: Covert Channels and Data Exfiltration From FPGAs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Leaky hardware: modeling and exploiting imperfections in embedded devices.
PhD thesis, 2020

Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses.
IEEE Commun. Surv. Tutorials, 2020

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Cloud FPGA Security with RO-Based Primitives.
Proceedings of the International Conference on Field-Programmable Technology, 2020

Information Leakage from FPGA Routing and Logic Elements.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

Fingerprinting Cloud FPGA Infrastructures.
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020

2019
Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks.
ACM Trans. Reconfigurable Technol. Syst., 2019

SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses.
CoRR, 2019

Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs.
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019

A Framework for Evaluating Security in the Presence of Signal Injection Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018

Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
On Bitcoin Security in the Presence of Broken Crypto Primitives.
IACR Cryptol. ePrint Arch., 2016

Information Leakage Between FPGA Long Wires.
CoRR, 2016

On Bitcoin Security in the Presence of Broken Cryptographic Primitives.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
PDTL: Parallel and Distributed Triangle Listing for Massive Graphs.
Proceedings of the 44th International Conference on Parallel Processing, 2015


  Loading...