IEEE Symposium on Security and Privacy (S&P)
TDXRay: Microarchitectural Side-Channel Analysis of Intel TDX for Real-World Workloads
IEEE Symposium on Security and Privacy (S&P)
Crucible: Retrofitting Commodity CPUs with Vulnerabilities via Transparent Software Emulation
ACM Conference on Computer and Communications Security (CCS)
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
Microarchitecture Security Conference (uASC)
Zero-Store Elimination and its Implications on the SIKE Cryptosystem
Usenix Security Symposium (USENIX-Security)
Usenix Security Symposium (USENIX-Security)
GI International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
Taming the Linux Memory Allocator for Rapid Prototyping
IEEE Symposium on Security and Privacy (S&P)
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage
The Web Conference (WWW)
Peripheral Instinct: How External Devices Breach Browser Sandboxes
Financial Cryptography and Data Security (FC)
Lixom: Protecting Encryption Keys with Execute-Only Memory