Yan Michalevsky

According to our database1, Yan Michalevsky authored at least 17 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
High Performance, Low Energy, and Trustworthy Blockchains Using Satellites.
Found. Trends Netw., 2023

DBREACH: Stealing from Databases Using Compression Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Securing Access to Untrusted Services From TEEs with GateKeeper.
CoRR, 2022

2019
CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

2018
Online detection of effectively callback free objects with applications to smart contracts.
Proc. ACM Program. Lang., 2018

Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy.
IACR Cryptol. ePrint Arch., 2018

RSA Signatures Under Hardware Restrictions.
IACR Cryptol. ePrint Arch., 2018

Decentralized Policy-Hiding ABE with Receiver Privacy.
Proceedings of the Computer Security, 2018

2017
SpaceTEE: Secure and Tamper-Proof Computing in Space using CubeSats.
CoRR, 2017

WaC: SpaceTEE - Secure and Tamper-Proof Computing in Space using CubeSats.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

2016
MASHaBLE: mobile applications of secret handshakes over bluetooth LE.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

2015
PowerSpy: Location Tracking using Mobile Device Power Analysis.
CoRR, 2015

PowerSpy: Location Tracking Using Mobile Device Power Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Mobile Device Identification via Sensor Fingerprinting.
CoRR, 2014

Gyrophone: Recognizing Speech from Gyroscope Signals.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2011
Speaker identification using diffusion maps.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Venus: verification for untrusted cloud storage.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010


  Loading...