Author of the publication

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.

, , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 171-191 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MemJam: A False Dependency Attack against Constant-Time Crypto Implementations., , and . CoRR, (2017)CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 171-191 (2018)SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks., , , , , , and . USENIX Security Symposium, page 621-637. USENIX Association, (2019)MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations., , , and . International Journal of Parallel Programming, 47 (4): 538-570 (2019)MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 21-44. Springer, (2018)FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning., , , and . CoRR, (2019)MicroWalk: A Framework for Finding Side Channels in Binaries., , , and . ACSAC, page 161-173. ACM, (2018)Abstract runtime structure for reasoning about security: poster., , , and . HotSoS, page 1-3. ACM, (2016)CacheZoom: How SGX Amplifies the Power of Cache Attacks., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 69-90. Springer, (2017)