Jo Van Bulck

According to our database1, Jo Van Bulck authored at least 16 papers between 2015 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

ZombieLoad: Cross-Privilege-Boundary Data Sampling.
CoRR, 2019

A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors.
;login:, 2018

A Systematic Evaluation of Transient Execution Attacks and Defenses.
CoRR, 2018

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution.
Proceedings of the 26th USENIX Security Symposium, 2017

SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016

Towards availability and real-time guarantees for protected module architectures.
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016

2015
Secure Resource Sharing for Embedded Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2015


  Loading...