Yuval Yarom

According to our database1, Yuval Yarom authored at least 36 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

Robust Website Fingerprinting Through the Cache Occupancy Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

Time Protection: The Missing OS Abstraction.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware.
J. Cryptographic Engineering, 2018

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
IACR Cryptology ePrint Archive, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

No Security Without Time Protection: We Need a New Hardware-Software Contract.
Proceedings of the 9th Asia-Pacific Workshop on Systems, 2018

Drive-By Key-Extraction Cache Attacks from Portable Code.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures.
IACR Cryptology ePrint Archive, 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

Modifying an Enciphering Scheme After Deployment.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware.
IACR Cryptology ePrint Archive, 2016

CATalyst: Defeating last-level cache side channel attacks in cloud computing.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

"Make Sure DSA Signing Exponentiations Really are Constant-Time".
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Amplifying side channels through performance degradation.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Mapping the Intel Last-Level Cache.
IACR Cryptology ePrint Archive, 2015

Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.
IACR Cryptology ePrint Archive, 2015

Last-Level Cache Side-Channel Attacks are Practical.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Just a Little Bit More.
Proceedings of the Topics in Cryptology, 2015

Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack.
IACR Cryptology ePrint Archive, 2014

FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2008
Estimating camera overlap in large and growing networks.
Proceedings of the 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras, 2008


  Loading...