Submission History
View publications: by year; by type;
2024 decisions
AIHWS 2024AcceptCNN Architecture Extraction on Edge GPU
ASPLOS 2024Reject—Redacted—
ASPLOS 2024Reject—Redacted—
CCS 2024AcceptTesting Side-Channel Security of Cryptographic Implementations against Future Microarchitectures
CHES 2024AcceptEvict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
Eurocrypt 2024Reject—Redacted—
USENIX Sec 2024Reject—Redacted—
2023 decisions
AsiaCCS 2023AcceptCacheFX: A Framework for Evaluating Cache Security
AsiaCCS 2024AcceptSoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
CCS 2023Reject—Redacted—
CCS 2023RejectTeeJam: Sub-Cache-Line Leakages Strike Back
CCS 2023AcceptiLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
CHES 2024RevisionEvict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks
CHES 2024AcceptTeeJam: Sub-Cache-Line Leakages Strike Back
ICSE Demo 2023AcceptCryptOpt: Automatic Optimization of Straightline Code
IEEE SP 2023RejectPixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome
IEEE SP 2023RevisionSoK: SGX.Fail: How Stuff Gets eXposed
IEEE SP 2024RejectTesting Side-Channel Security of Cryptographic Implementations against Future Microarchitectures
IEEE SP 2024Reject—Redacted—
IEEE SP 2024AcceptSoK: SGX.Fail: How Stuff Gets eXposed
IEEE SP 2024Reject—Redacted—
PLDI 2023AcceptCryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
USENIX Sec 2023AcceptBunnyHop: Exploiting the Instruction Prefetcher
USENIX Sec 2023AcceptUltimate SLH: Taking Speculative Load Hardening to the Next Level
USENIX Sec 2023AcceptChecking Passwords on Leaky Computers: A Side Channel Analysis of Chrome’s Password Leak Detection Protocol
USENIX Sec 2023Reject—Redacted—
USENIX Sec 2023AcceptHot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs
USENIX Sec 2024AcceptSledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
USENIX Sec 2024AcceptPixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome
USENIX Sec 2024Reject—Redacted—
2022 decisions
ACSAC 2022RejectCacheFX: A Framework for Evaluating Cache Security
AsiaCCS 2022AcceptSoK: Design Tools for Side-Channel-Aware Implementations
CCS 2022RevisionHammerScope: Observing DRAM Power Consumption Using Rowhammer
CCS 2022AcceptHammerScope: Observing DRAM Power Consumption Using Rowhammer
GI@GECCO 2022AcceptOpportunities for Genetic Improvement of Cryptographic Code
IEEE SP 2023AcceptSpectre Declassified: Reading from the Right Place at the Wrong Time
IEEE SP 2023RejectiLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
IEEE TDSCReject—Redacted—
ISCA 2022RejectCacheFX: A Framework for Evaluating Cache Security
NDSS 2023RejectSoK: SGX.Fail: How Stuff Gets eXposed
POPL 2023RejectCryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
The Computer JournalRevisionRow, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
The Computer JournalAcceptRow, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
USENIX Sec 2022RevisionThe Impostor Among US(B): Off Path Injection Attacks on USB Communications
USENIX Sec 2022RejectHammerScope: Observing DRAM Power Consumption Using Rowhammer
USENIX Sec 2022RejectSoK: SGX.Fail: How Stuff Gets eXposed
USENIX Sec 2022RevisionThe Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Sec 2022RevisionUltimate SLH: Taking Speculative Load Hardening to the Next Level
USENIX Sec 2023AcceptThe Impostor Among US(B): Off Path Injection Attacks on USB Communications
USENIX Sec 2023AcceptThe Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Sec 2023RejectSoK: SGX.Fail: How Stuff Gets eXposed
2021 decisions
ACNS 2022AcceptRSA Key Recovery from Digit Equivalence Information
Asiacrypt 2021RejectSide-Channeling the Kalyna Key Expansion
CCS 2021RevisionRosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
CCS 2021AcceptRosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
CFAIL 2021AcceptRow, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
CHES 2021RejectSide-Channeling the Kalyna Key Expansion
CT-RSA 2022AcceptSide-Channeling the Kalyna Key Expansion
Euro S&P 2021AcceptNonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms
IEEE MicroReject—Redacted—
IEEE SP 2022RevisionSoK: Design Tools for Side-Channel-Aware Implementations
IEEE SP 2022AcceptSpook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
IEEE SP 2022RejectSoK: Design Tools for Side-Channel-Aware Implementations
IEEE SP 2022RevisionSpectre Declassified: Reading from the Right Place at the Wrong Time
NDSS 2022RevisionDrawnApart: A Unique Device Identification Technique based on Remote GPU Fingerprinting
NDSS 2022AcceptDrawnApart: A Unique Device Identification Technique based on Remote GPU Fingerprinting
USENIX Sec 2021RejectDrawnApart: A Unique Device Identification Technique based on Remote GPU Fingerprinting
USENIX Sec 2022RejectCryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives
2020 decisions
ACSAC 2020RejectA Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
CCS 2020RejectNonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms
CCS 2020AcceptLadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
ICEIS 2020AcceptEnterprise Security Architecture: Mythology or Methodology?
IEEE SP 2020RejectRosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
IEEE SP 2021RejectDrawnApart: A Unique Device Identification Technique based on Remote GPU Fingerprinting
IEEE SP 2021AcceptCacheOut: Leaking Data on Intel CPUs via Cache Evictions
IEEE SP 2021RejectCacheFX: A Framework for Evaluating Cache Security
IEEE TDSCRevisionWebsite Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
IEEE TDSCRejectA Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
IEEE TDSCAcceptWebsite Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality
LNBIP EISAcceptSecurity Architecture Framework for Enterprises
MICRO 2020AcceptPThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses
NDSS 2021RejectCacheOut: Leaking Data on Intel CPUs via Cache Evictions
NDSS 2021RevisionRosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
NDSS 2021RejectNonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms
NDSS 2021AcceptRosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
RAID 2020RejectA Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
S&P Mag.AcceptWhack-a-Meltdown: Microarchitectural Security Games
SSR 2020RejectA Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
TPS-ISA 2020AcceptA Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
USENIX Sec 2020RejectCacheOut: Leaking Data on Intel CPUs via Cache Evictions
USENIX Sec 2020RevisionPrime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
USENIX Sec 2021AcceptPrime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
2019 decisions
ACIS 2019RejectEnterprise Security Architecture: Mythology or Methodology?
CACMRevisionMeltdown: Reading Kernel Memory from User Space
CACMAcceptMeltdown: Reading Kernel Memory from User Space
CACMAcceptSpectre Attacks: Exploiting Speculative Execution
CCS 2019Reject—Redacted—
CCS 2019RevisionFallout: Leaking Data on Meltdown-resistant CPUs
CCS 2019AcceptFallout: Leaking Data on Meltdown-resistant CPUs
CHES 2020AcceptCache vs. Key-Dependency: Side Channeling an Implementation of Pilsung
IEEE MicroAcceptBreaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow
IEEE SP 2020AcceptRAMBleed: Reading Bits in Memory Without Accessing Them
IEEE SP 2020AcceptPseudorandom Black Swans: Cache Attacks on CTR_DRBG
IEEE SP 2020AcceptLVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
USENIX Sec 2019AcceptRobust Website Fingerprinting Through the Cache Occupancy Channel
USENIX Sec 2019RejectNonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms
2018 decisions
ACNS 2018AcceptDrive-by Key-Extraction Cache Attacks from Portable Code
APSys 2018AcceptNo Security Without Time protection: We Need a New hardware Software Contract
ATC 2018RejectNo Security Without Time protection: We Need a New hardware Software Contract
CANDAR 2018AcceptThe Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay
CCS 2018RejectRobust Website Fingerprinting Through the Cache Occupancy Channel
ECIS 2018RejectEnterprise Security Architecture: Mythology or Methodology?
EuroSys 2019AcceptTime Protection: the Missing OS Abstraction
IEEE SP 2018AcceptAnother Flip in the Wall of Rowhammer Defenses
IEEE SP 2019AcceptSpectre Attacks: Exploiting Speculative Execution
IEEE SP 2019AcceptThe 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
NDSS 2019RejectRobust Website Fingerprinting Through the Cache Occupancy Channel
TCHESAcceptCacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
USENIX Sec 2018AcceptMeltdown: Reading Kernel Memory from User Space
2017 decisions
ASPLOS 2018RejectNo Security Without Time protection: We Need a New hardware Software Contract
CCS 2017AcceptMay the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
CCS 2017AcceptTo BLISS-B or not to be — Attacking StrongSwan's Implementation of Post-Quantum Signatures
CCS 2017RejectDrive-by Key-Extraction Cache Attacks from Portable Code
CHES 2017AcceptSliding Right Into Disaster: Left-to-Right Sliding Windows Leak
Euro S&P 2018RejectDrive-by Key-Extraction Cache Attacks from Portable Code
Eurocrypt 2017AcceptModifying an Enciphering Scheme after Deployment
IEEE SP 2017RejectNo Security Without Time protection: We Need a New hardware Software Contract
IEEE SP 2018RevisionAnother Flip in the Wall of Rowhammer Defenses
JCENRevisionCacheBleed: A Timing Attack on OpenSSL Constant Time RSA
JCENAcceptCacheBleed: A Timing Attack on OpenSSL Constant Time RSA
SOSP 2017RejectTime Protection: the Missing OS Abstraction
Scientific ReportsRevisionReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
Scientific ReportsAcceptReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
Security and PrivacyReject—Redacted—
USENIX Sec 2017AcceptUSB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
USENIX Sec 2017RejectNo Security Without Time protection: We Need a New hardware Software Contract
2016 decisions
ACIS 2016RejectEnterprise Security Architecture: Mythology or Methodology?
ACSAC 2016AcceptAmplifying Side Channels Through Performance Degradation
Asiacrypt 2016RejectModifying an Enciphering Scheme after Deployment
CCS 2016Accept“Make Sure DSA Signing Exponentiations Really are Constant-Time”
CCS 2016AcceptECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
CHES 2016AcceptCacheBleed: A Timing Attack on OpenSSL Constant Time RSA
CHES 2016AcceptFlush, Gauss, and Reload — A Cache Attack on the BLISS Lattice-Based Signature Scheme
CHES 2016RejectECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
COMINDRejectEnterprise Security Architecture: Mythology or Methodology?
CRYPTO 2016RejectModifying an Enciphering Scheme after Deployment
Eurocrypt 2016RejectExploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
IEEE SP 2016RejectEnterprise Security Architecture: Mythology or Methodology?
IEEE SP 2016RejectAmplifying Side Channels Through Performance Degradation
IJISReject—Redacted—
JCENRevisionA Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
JCENAcceptA Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
NDSS 2017RejectUSB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
NatureRejectReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
Nature CommunicationsRejectReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
Nature PlantsRejectReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
PNASRejectReplacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
TISSECReject—Redacted—
USENIX Sec 2016RejectAmplifying Side Channels Through Performance Degradation
2015 decisions
ACNS 2015AcceptEvaluation and Cryptanalysis of the Pandaka Lightweight Cipher
CT-RSA 2015AcceptJust a Little Bit More
HPCA 2016AcceptCATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
IEEE SP 2015AcceptLast-Level Cache Side-Channel Attacks are Practical
IEEE SP 2015RejectA Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
2014 decisions
Asiacrypt 2014RejectJust a Little Bit More
CHES 2014Accept“Ooh Aah ... Just a Little Bit”: A Small Amount of Side Channel can go a Long Way
IEEE SP 2014RejectFlush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
USENIX Sec 2014AcceptFlush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
2013 decisions
NDSS 2014RejectFlush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
2012 decisions
OOPSLA 2012RejectS-RVM: a Secure Design for a High-Performance Java Virtual Machine
VMIL 2012AcceptS-RVM: a Secure Design for a High-Performance Java Virtual Machine
2011 decisions
APSys 2011RejectS-RVM: a Secure Design for a High-Performance Java Virtual Machine
2008 decisions
ICDSC 2008AcceptEstimating Camera Overlap in Large and Growing Networks