Yuval Yarom
Institution: Ruhr-Universität Bochum / CASA
Research Hub(s):
Hub B: Embedded Security
Hub C: Secure Systems
E-Mail: Yuval.Yarom@rub.de
Adress: MC 1/44
Website: https://yuval.yarom.org/
Publications:
Spectre Declassified: Reading from the Right Place at the Wrong Time SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? Testing Side-Channel Security of Cryptographic Implementations against Future Microarchitectures CNN Architecture Extraction on Edge GPU TeeJam: Sub-Cache-Line Leakages Strike Back SoK: SGX.Fail: How Stuff Gets eXposed CacheFX: A Framework for Evaluating Cache Security Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives Ultimate SLH: Taking Speculative Load Hardening to the Next Level Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol