What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Berk Sunar
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
LeapFrog: The Rowhammer Instruction Skip Attack.
Andrew J. Adiletta
M. Caner Tol
Kemal Derya
Berk Sunar
Saad Islam
2025
conf/asiaccs
FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack.
Kemal Derya
M. Caner Tol
Berk Sunar
2024
conf/iciss
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
Zane Weissman
Thore Tiemann
Thomas Eisenbarth
Berk Sunar
2024
conf/esorics
ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMs.
M. Caner Tol
Berk Sunar
2024
conf/asiaccs
Mayhem: Targeted Corruption of Register and Stack Variables.
Andrew J. Adiletta
M. Caner Tol
Yarkin Doröz
Berk Sunar
2023
conf/sp
Jolt: Recovering TLS Signing Keys via Rowhammer Faults.
Koksal Mus
Yarkin Doröz
M. Caner Tol
Kristi Rahman
Berk Sunar
2023
conf/asiaccs
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems.
Thore Tiemann
Zane Weissman
Thomas Eisenbarth
Berk Sunar
2023
conf/dsn
Don't Knock! Rowhammer at the Backdoor of DNN Models.
M. Caner Tol
Saad Islam
Andrew J. Adiletta
Berk Sunar
Ziming Zhang
2022
conf/eurosp
Signature Correction Attack on Dilithium Signature Scheme.
Saad Islam
Koksal Mus
Richa Singh
Patrick Schaumont
Berk Sunar
2021
conf/eurosp
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings.
M. Caner Tol
Berk Gülmezoglu
Koray Yurtseven
Berk Sunar
2020
journals/tches
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms.
Zane Weissman
Thore Tiemann
Daniel Moghimi
Evan Custodio
Thomas Eisenbarth
Berk Sunar
2020
conf/ccs
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme.
Koksal Mus
Saad Islam
Berk Sunar
2020
conf/uss
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Daniel Moghimi
Moritz Lipp
Berk Sunar
Michael Schwarz
2020
conf/uss
CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Daniel Moghimi
Jo Van Bulck
Nadia Heninger
Frank Piessens
Berk Sunar
2020
conf/uss
TPM-FAIL: TPM meets Timing and Lattice Attacks.
Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
2020
conf/sp
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Jo Van Bulck
Daniel Moghimi
Michael Schwarz
Moritz Lipp
Marina Minkin
Daniel Genkin
Yuval Yarom
Berk Sunar
Daniel Gruss
Frank Piessens
2019
conf/ccs
Undermining User Privacy on Mobile Devices Using AI.
Berk Gülmezoglu
Andreas Zankl
M. Caner Tol
Saad Islam
Thomas Eisenbarth
Berk Sunar
2019
conf/ccs
Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella
Daniel Genkin
Lukas Giner
Daniel Gruss
Moritz Lipp
Marina Minkin
Daniel Moghimi
Frank Piessens
Michael Schwarz
Berk Sunar
Jo Van Bulck
Yuval Yarom
2019
conf/uss
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
Saad Islam
Ahmad Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gülmezoglu
Thomas Eisenbarth
Berk Sunar
2018
journals/tifs
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
Wei Dai
Yarkin Doröz
Yuriy Polyakov
Kurt Rohloff
Hadi Sajjadpour
Erkay Savas
Berk Sunar
2018
conf/pkc
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
Yarkin Doröz
Jeffrey Hoffstein
Jill Pipher
Joseph H. Silverman
Berk Sunar
William Whyte
Zhenfei Zhang
2018
conf/ctrsa
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Ahmad Moghimi
Thomas Eisenbarth
Berk Sunar
2018
conf/acsac
MicroWalk: A Framework for Finding Side Channels in Binaries.
Jan Wichelmann
Ahmad Moghimi
Thomas Eisenbarth
Berk Sunar
2017
conf/latincrypt
Homomorphic Rank Sort Using Surrogate Polynomials.
Gizem S. Çetin
Berk Sunar
2017
conf/ccs
Hit by the Bus: QoS Degradation Attack on Android.
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2017
conf/ccs
Cache-Based Application Detection in the Cloud Using Machine Learning.
Berk Gülmezoglu
Thomas Eisenbarth
Berk Sunar
2017
conf/esorics
PerfWeb: How to Violate Web Privacy with Hardware Performance Events.
Berk Gülmezoglu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
2016
conf/ccs
Cross Processor Cache Attacks.
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2016
conf/fc
On-the-fly Homomorphic Batching/Unbatching.
Yarkin Doröz
Gizem S. Çetin
Berk Sunar
2016
conf/ches
Cache Attacks Enable Bulk Key Recovery on the Cloud.
Mehmet Sinan Inci
Berk Gülmezoglu
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2016
conf/acsac
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure.
Mehmet Sinan Inci
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2015
journals/popets
Know Thy Neighbor: Crypto Library Detection in Cloud.
Gorka Irazoqui
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2015
conf/latincrypt
Depth Optimized Efficient Homomorphic Sorting.
Gizem S. Çetin
Yarkin Doröz
Berk Sunar
Erkay Savas
2015
conf/ccs
Lucky 13 Strikes Back.
Gorka Irazoqui Apecechea
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2015
conf/fc
Accelerating SWHE Based PIRs Using GPUs.
Wei Dai
Yarkin Doröz
Berk Sunar
2015
conf/sp
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Gorka Irazoqui Apecechea
Thomas Eisenbarth
Berk Sunar
2015
conf/ches
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware.
Yarkin Doröz
Erdinç Öztürk
Erkay Savas
Berk Sunar
2014
conf/fc
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince.
Yarkin Doröz
Aria Shahverdi
Thomas Eisenbarth
Berk Sunar
2014
conf/fc
Bandwidth Efficient PIR from NTRU.
Yarkin Doröz
Berk Sunar
Ghaith Hammouri
2011
journals/joc
Guest Editorial.
Christof Paar
Jean-Jacques Quisquater
Berk Sunar
2009
conf/ches
CDs Have Fingerprints Too.
Ghaith Hammouri
Aykutlu Dana
Berk Sunar
2009
conf/wisa
Non-linear Error Detection for Finite State Machines.
Kahraman D. Akdemir
Ghaith Hammouri
Berk Sunar
2009
conf/icics
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes.
Zhen Wang
Mark G. Karpovsky
Berk Sunar
Ajay Joshi
2009
conf/asiacrypt
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Frederik Armknecht
Roel Maes
Ahmad-Reza Sadeghi
Berk Sunar
Pim Tuyls
2008
conf/ccs
A fast real-time memory authentication protocol.
Yin Hu
Ghaith Hammouri
Berk Sunar
2008
conf/acns
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
Ghaith Hammouri
Berk Sunar
2008
conf/icisc
Novel PUF-Based Error Detection Methods in Finite State Machines.
Ghaith Hammouri
Kahraman D. Akdemir
Berk Sunar
2008
conf/icics
Unclonable Lightweight Authentication Scheme.
Ghaith Hammouri
Erdinç Öztürk
Berk Birand
Berk Sunar
2007
conf/sp
Trojan Detection using IC Fingerprinting.
Dakshi Agrawal
Selçuk Baktir
Deniz Karakoyunlu
Pankaj Rohatgi
Berk Sunar
2007
conf/fdtc
Tate Pairing with Strong Fault Resiliency.
Erdinç Öztürk
Gunnar Gaubatz
Berk Sunar
2006
conf/fdtc
Non-linear Residue Codes for Robust Public-Key Arithmetic.
Gunnar Gaubatz
Berk Sunar
Mark G. Karpovsky
2006
conf/fdtc
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography.
Gunnar Gaubatz
Berk Sunar
2005
conf/ches
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings.
Berk Sunar
David Cyganski
2004
conf/ches
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.
Erdinç Öztürk
Berk Sunar
Erkay Savas
Coauthors
Ahmad Moghimi
(3)
Ahmad-Reza Sadeghi
(1)
Ajay Joshi
(1)
Andreas Zankl
(2)
Andrew J. Adiletta
(3)
Aria Shahverdi
(1)
Aykutlu Dana
(1)
Berk Birand
(1)
Berk Gülmezoglu
(6)
Berk Sunar
(54)
Christof Paar
(1)
Claudio Canella
(1)
Dakshi Agrawal
(1)
Daniel Genkin
(2)
Daniel Gruss
(2)
Daniel Moghimi
(6)
David Cyganski
(1)
Deniz Karakoyunlu
(1)
Erdinç Öztürk
(4)
Erkay Savas
(4)
Evan Custodio
(1)
Frank Piessens
(3)
Frederik Armknecht
(1)
Ghaith Hammouri
(7)
Gizem S. Çetin
(3)
Gorka Irazoqui
(4)
Gorka Irazoqui Apecechea
(2)
Gunnar Gaubatz
(3)
Hadi Sajjadpour
(1)
Ida Bruhns
(1)
Jan Wichelmann
(1)
Jean-Jacques Quisquater
(1)
Jeffrey Hoffstein
(1)
Jill Pipher
(1)
Jo Van Bulck
(3)
Joseph H. Silverman
(1)
Kahraman D. Akdemir
(2)
Kemal Derya
(2)
Koksal Mus
(3)
Koray Yurtseven
(1)
Kristi Rahman
(1)
Kurt Rohloff
(1)
Lukas Giner
(1)
M. Caner Tol
(8)
Marina Minkin
(2)
Mark G. Karpovsky
(2)
Mehmet Sinan Inci
(5)
Michael Schwarz
(3)
Moritz Krebbel
(1)
Moritz Lipp
(3)
Nadia Heninger
(2)
Pankaj Rohatgi
(1)
Patrick Schaumont
(1)
Pim Tuyls
(1)
Richa Singh
(1)
Roel Maes
(1)
Saad Islam
(6)
Selçuk Baktir
(1)
Thomas Eisenbarth
(18)
Thore Tiemann
(3)
Wei Dai
(2)
William Whyte
(1)
Yarkin Doröz
(10)
Yin Hu
(1)
Yuriy Polyakov
(1)
Yuval Yarom
(2)
Zane Weissman
(3)
Zhen Wang
(1)
Zhenfei Zhang
(1)
Ziming Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to