Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG., , , , , , and . IACR Cryptol. ePrint Arch., (2019)Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone., , and . IEEE Symposium on Security and Privacy, page 905-919. IEEE, (2019)Cooperative inter-beam nulling: A side-channel strategy for managing inter-beam interference., and . ACSSC, page 1242-1246. IEEE, (2015)When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer., , , , , , , , , and 1 other author(s). CCS, page 979-993. ACM, (2022)Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor., , , , , , , , , and . ASPLOS (3), page 770-784. ACM, (2024)Pseudorandom Black Swans: Cache Attacks on CTR_DRBG., , , , , , and . SP, page 1241-1258. IEEE, (2020)RAMBleed: Reading Bits in Memory Without Accessing Them., , , and . SP, page 695-711. IEEE, (2020)Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol., , , , , , , , and . USENIX Security Symposium, page 7107-7124. USENIX Association, (2023)CacheOut: Leaking Data on Intel CPUs via Cache Evictions., , , , and . SP, page 339-354. IEEE, (2021)SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks., , , , and . SP, page 681-698. IEEE, (2022)