Ruhr-Uni-Bochum
Yuval Yarom

Yuval Yarom

Institution: Ruhr-Universität Bochum / CASA

Research Hub(s):

Hub B: Eingebettete Sicherheit
Hub C: Sichere Systeme

E-Mail: Yuval.Yarom@rub.de

Adresse: MC 1/44

Publikationen:

Protecting cryptographic code against Spectre-RSB (and, in fact, all known Spectre variants) Spec-o-Scope: Cache Probing at Cache Speed Testing Side-Channel Security of Cryptographic Implementations against Future Microarchitectures SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks On Borrowed Time — Preventing Static Side-Channel Analysis SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye Reverse-Engineering the Address Translation Caches FLOP: Breaking the Apple M3 CPU via False Load Output Predictions BarraCUDA: Edge GPUs do Leak DNN Weights CNN Architecture Extraction on Edge GPU iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs CacheFX: A Framework for Evaluating Cache Security Spectre Declassified: Reading from the Right Place at the Wrong Time Ultimate SLH: Taking Speculative Load Hardening to the Next Level Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism TeeJam: Sub-Cache-Line Leakages Strike Back SoK: SGX.Fail: How Stuff Gets eXposed