追蹤
Daniel Genkin
Daniel Genkin
在 gatech.edu 的電子郵件地址已通過驗證 - 首頁
標題
引用次數
引用次數
年份
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
2019 IEEE Symposium on Security and Privacy (SP), 1-19, 2019
32332019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
2665*2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
13932018
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
Annual cryptology conference, 90-108, 2013
8662013
RSA key extraction via low-bandwidth acoustic cryptanalysis
D Genkin, A Shamir, E Tromer
Advances in Cryptology–CRYPTO 2014, 444-461, 2014
6652014
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
413*2019
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
International Conference on Cryptographic Hardware and Embedded Systems, 346-367, 2016
4112016
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
3302020
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
3022018
Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical Report, 2018
2512018
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems–CHES 2014, 242-260, 2014
247*2014
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2412016
Light commands: laser-based audio injection attacks on voice-controllable systems
T Sugawara, B Cyr, S Rampazzi, D Genkin, K Fu
29th USENIX Security Symposium (USENIX Security 20), 2631-2648, 2020
2402020
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Security and Privacy (SP), 2017 IEEE Symposium on, 863-880, 2017
2312017
RAMBleed: Reading Bits in Memory Without Accessing Them
A Kwong, D Genkin, D Gruss, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
2292020
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
2272015
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
K Chida, D Genkin, K Hamada, D Ikarashi, R Kikuchi, Y Lindell, A Nof
Annual International Cryptology Conference, 34-64, 2018
201*2018
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
https://cacheoutattack.com/, 2020
1782020
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 495-504, 2014
1352014
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
1312013
系統目前無法執行作業,請稍後再試。
文章 1–20