What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuval Yarom
Google Scholar
67
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information.
Marcus Brinkmann
Chitchanok Chuengsatiansup
Alexander May
Julian Nowakowski
Yuval Yarom
2025
conf/sp
SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon.
Jason Kim
Daniel Genkin
Yuval Yarom
2025
conf/sp
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye.
Bradley Morgan
Gal Horowitz
Sioli O'Connell
Stephan van Schaik
Chitchanok Chuengsatiansup
Daniel Genkin
Olaf Maennel
Paul Montague
Eyal Ronen
Yuval Yarom
2025
conf/ndss
On Borrowed Time - Preventing Static Side-Channel Analysis.
Robert Dumitru
Thorben Moos
Andrew Wabnitz
Yuval Yarom
2025
conf/uss
BarraCUDA: Edge GPUs do Leak DNN Weights.
Péter Horváth
Lukasz Chmielewski
Léo Weissbart
Lejla Batina
Yuval Yarom
2025
conf/uss
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions.
Jason Kim
Jalen Chuang
Daniel Genkin
Yuval Yarom
2025
conf/uss
ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory.
Nureddin Kamadan
Walter Wang
Stephan van Schaik
Christina Garman
Daniel Genkin
Yuval Yarom
2024
journals/tches
TeeJam: Sub-Cache-Line Leakages Strike Back.
Florian Sieck
Zhiyuan Zhang
Sebastian Berndt
Chitchanok Chuengsatiansup
Thomas Eisenbarth
Yuval Yarom
2024
journals/tches
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks.
Shing Hing William Cheng
Chitchanok Chuengsatiansup
Daniel Genkin
Dallas McNeil
Toby Murray
Yuval Yarom
Zhiyuan Zhang
2024
conf/ccs
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget.
Jiankai Jin
Chitchanok Chuengsatiansup
Toby Murray
Benjamin I. P. Rubinstein
Yuval Yarom
Olga Ohrimenko
2024
conf/ccs
Spec-o-Scope: Cache Probing at Cache Speed.
Gal Horowitz
Eyal Ronen
Yuval Yarom
2024
conf/ccs
Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
Chitchanok Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Yuval Yarom
2024
conf/uss
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome.
Sioli O'Connell
Lishay Aben Sour
Ron Magen
Daniel Genkin
Yossi Oren
Hovav Shacham
Yuval Yarom
2024
conf/uss
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism.
Ingab Kang
Walter Wang
Jason Kim
Stephan van Schaik
Youssef Tobah
Daniel Genkin
Andrew Kwong
Yuval Yarom
2024
conf/sp
SoK: SGX.Fail: How Stuff Gets eXposed.
Stephan van Schaik
Alexander Seto
Thomas Yurek
Adam Batori
Bader AlBassam
Daniel Genkin
Andrew Miller
Eyal Ronen
Yuval Yarom
Christina Garman
2024
conf/acns
CNN Architecture Extraction on Edge GPU.
Péter Horváth
Lukasz Chmielewski
Leo Weissbart
Lejla Batina
Yuval Yarom
2024
conf/asiaccs
SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
William Kosasih
Yusi Feng
Chitchanok Chuengsatiansup
Yuval Yarom
Ziyuan Zhu
2023
conf/ccs
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices.
Jason Kim
Stephan van Schaik
Daniel Genkin
Yuval Yarom
2023
conf/uss
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications.
Robert Dumitru
Daniel Genkin
Andrew Wabnitz
Yuval Yarom
2023
conf/uss
The Gates of Time: Improving Cache Attacks with Transient Execution.
Daniel Katzman
William Kosasih
Chitchanok Chuengsatiansup
Eyal Ronen
Yuval Yarom
2023
conf/uss
BunnyHop: Exploiting the Instruction Prefetcher.
Zhiyuan Zhang
Mingtian Tao
Sioli O'Connell
Chitchanok Chuengsatiansup
Daniel Genkin
Yuval Yarom
2023
conf/uss
Ultimate SLH: Taking Speculative Load Hardening to the Next Level.
Zhiyuan Zhang
Gilles Barthe
Chitchanok Chuengsatiansup
Peter Schwabe
Yuval Yarom
2023
conf/uss
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Andrew Kwong
Walter Wang
Jason Kim
Jonathan Berger
Daniel Genkin
Eyal Ronen
Hovav Shacham
Riad S. Wahby
Yuval Yarom
2023
conf/uss
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.
Hritvik Taneja
Jason Kim
Jie Jeff Xu
Stephan van Schaik
Daniel Genkin
Yuval Yarom
2023
conf/sp
Spectre Declassified: Reading from the Right Place at the Wrong Time.
Basavesh Ammanaghatta Shivakumar
Jack Barnes
Gilles Barthe
Sunjay Cauligi
Chitchanok Chuengsatiansup
Daniel Genkin
Sioli O'Connell
Peter Schwabe
Rui Qi Sim
Yuval Yarom
2023
conf/asiaccs
CacheFX: A Framework for Evaluating Cache Security.
Daniel Genkin
William Kosasih
Fangfei Liu
Anna Trikalinou
Thomas Unterluggauer
Yuval Yarom
2022
conf/ccs
Automating Cryptographic Code Generation.
Yuval Yarom
2022
conf/ccs
HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Yaakov Cohen
Kevin Sam Tharayil
Arie Haenel
Daniel Genkin
Angelos D. Keromytis
Yossi Oren
Yuval Yarom
2022
conf/sp
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Ayush Agarwal
Sioli O'Connell
Jason Kim
Shaked Yehezkel
Daniel Genkin
Eyal Ronen
Yuval Yarom
2022
conf/acns
RSA Key Recovery from Digit Equivalence Information.
Chitchanok Chuengsatiansup
Andrew Feutrill
Rui Qi Sim
Yuval Yarom
2022
conf/asiaccs
SoK: Design Tools for Side-Channel-Aware Implementations.
Ileana Buhan
Lejla Batina
Yuval Yarom
Patrick Schaumont
2022
conf/ndss
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.
Tomer Laor
Naif Mehanna
Antonin Durey
Vitaly Dyadyuk
Pierre Laperdrix
Clémentine Maurice
Yossi Oren
Romain Rouvoy
Walter Rudametkin
Yuval Yarom
2022
conf/ctrsa
Side-Channeling the Kalyna Key Expansion.
Chitchanok Chuengsatiansup
Daniel Genkin
Yuval Yarom
Zhiyuan Zhang
2021
conf/ccs
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code.
Madura A. Shelton
Lukasz Chmielewski
Niels Samwel
Markus Wagner
Lejla Batina
Yuval Yarom
2021
conf/uss
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.
Anatoly Shusterman
Ayush Agarwal
Sioli O'Connell
Daniel Genkin
Yossi Oren
Yuval Yarom
2021
conf/sp
CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
Stephan van Schaik
Marina Minkin
Andrew Kwong
Daniel Genkin
Yuval Yarom
2021
conf/eurosp
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Monjur Alam
Baki Berkay Yilmaz
Frank Werner
Niels Samwel
Alenka G. Zajic
Daniel Genkin
Yuval Yarom
Milos Prvulovic
2021
conf/ndss
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers.
Madura A. Shelton
Niels Samwel
Lejla Batina
Francesco Regazzoni
Markus Wagner
Yuval Yarom
2020
journals/tches
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.
Daniel Genkin
Romain Poussier
Rui Qi Sim
Yuval Yarom
Yuanjing Zhao
2020
conf/ccs
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage.
Diego F. Aranha
Felipe Rodrigues Novaes
Akira Takahashi
Mehdi Tibouchi
Yuval Yarom
2020
conf/sp
RAMBleed: Reading Bits in Memory Without Accessing Them.
Andrew Kwong
Daniel Genkin
Daniel Gruss
Yuval Yarom
2020
conf/sp
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Shaanan Cohney
Andrew Kwong
Shahar Paz
Daniel Genkin
Nadia Heninger
Eyal Ronen
Yuval Yarom
2020
conf/sp
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Jo Van Bulck
Daniel Moghimi
Michael Schwarz
Moritz Lipp
Marina Minkin
Daniel Genkin
Yuval Yarom
Berk Sunar
Daniel Gruss
Frank Piessens
2019
conf/ccs
Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella
Daniel Genkin
Lukas Giner
Daniel Gruss
Moritz Lipp
Marina Minkin
Daniel Moghimi
Frank Piessens
Michael Schwarz
Berk Sunar
Jo Van Bulck
Yuval Yarom
2019
conf/uss
Robust Website Fingerprinting Through the Cache Occupancy Channel.
Anatoly Shusterman
Lachlan Kang
Yarden Haskal
Yosef Meltser
Prateek Mittal
Yossi Oren
Yuval Yarom
2019
conf/sp
Spectre Attacks: Exploiting Speculative Execution.
Paul Kocher
Jann Horn
Anders Fogh
Daniel Genkin
Daniel Gruss
Werner Haas
Mike Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Yuval Yarom
2019
conf/sp
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
Eyal Ronen
Robert Gillham
Daniel Genkin
Adi Shamir
David Wong
Yuval Yarom
2018
journals/tches
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
Fergus Dall
Gabrielle De Micheli
Thomas Eisenbarth
Daniel Genkin
Nadia Heninger
Ahmad Moghimi
Yuval Yarom
2018
conf/uss
Meltdown: Reading Kernel Memory from User Space.
Moritz Lipp
Michael Schwarz
Daniel Gruss
Thomas Prescher
Werner Haas
Anders Fogh
Jann Horn
Stefan Mangard
Paul Kocher
Daniel Genkin
Yuval Yarom
Mike Hamburg
2018
conf/uss
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Jo Van Bulck
Marina Minkin
Ofir Weisse
Daniel Genkin
Baris Kasikci
Frank Piessens
Mark Silberstein
Thomas F. Wenisch
Yuval Yarom
Raoul Strackx
2018
conf/sp
Another Flip in the Wall of Rowhammer Defenses.
Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O'Connell
Wolfgang Schoechl
Yuval Yarom
2018
conf/acns
Drive-By Key-Extraction Cache Attacks from Portable Code.
Daniel Genkin
Lev Pachmanov
Eran Tromer
Yuval Yarom
2017
conf/ccs
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures.
Peter Pessl
Leon Groot Bruinderink
Yuval Yarom
2017
conf/ccs
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Daniel Genkin
Luke Valenta
Yuval Yarom
2017
conf/uss
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Yang Su
Daniel Genkin
Damith Chinthana Ranasinghe
Yuval Yarom
2017
conf/ches
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Daniel J. Bernstein
Joachim Breitner
Daniel Genkin
Leon Groot Bruinderink
Nadia Heninger
Tanja Lange
Christine van Vredendaal
Yuval Yarom
2017
conf/eurocrypt
Modifying an Enciphering Scheme After Deployment.
Paul Grubbs
Thomas Ristenpart
Yuval Yarom
2016
conf/ccs
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
Yuval Yarom
2016
conf/ccs
"Make Sure DSA Signing Exponentiations Really are Constant-Time".
Cesar Pereida García
Billy Bob Brumley
Yuval Yarom
2016
conf/ches
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
Leon Groot Bruinderink
Andreas Hülsing
Tanja Lange
Yuval Yarom
2016
conf/ches
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Yuval Yarom
Daniel Genkin
Nadia Heninger
2016
conf/acsac
Amplifying side channels through performance degradation.
Thomas Allan
Billy Bob Brumley
Katrina Falkner
Joop van de Pol
Yuval Yarom
2015
conf/sp
Last-Level Cache Side-Channel Attacks are Practical.
Fangfei Liu
Yuval Yarom
Qian Ge
Gernot Heiser
Ruby B. Lee
2015
conf/acns
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher.
Yuval Yarom
Gefei Li
Damith Chinthana Ranasinghe
2015
conf/ctrsa
Just a Little Bit More.
Joop van de Pol
Nigel P. Smart
Yuval Yarom
2014
conf/uss
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack.
Yuval Yarom
Katrina Falkner
2014
conf/ches
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
Naomi Benger
Joop van de Pol
Nigel P. Smart
Yuval Yarom
Coauthors
Adam Batori
(1)
Adi Shamir
(1)
Ahmad Moghimi
(1)
Akira Takahashi
(1)
Alenka G. Zajic
(1)
Alexander May
(1)
Alexander Seto
(1)
Anatoly Shusterman
(2)
Anders Fogh
(2)
Andreas Hülsing
(1)
Andrew Feutrill
(1)
Andrew Kwong
(5)
Andrew Miller
(1)
Andrew Wabnitz
(2)
Angelos D. Keromytis
(1)
Anna Trikalinou
(1)
Antonin Durey
(1)
Arie Haenel
(1)
Ayush Agarwal
(2)
Bader AlBassam
(1)
Baki Berkay Yilmaz
(1)
Baris Kasikci
(1)
Basavesh Ammanaghatta Shivakumar
(1)
Benjamin I. P. Rubinstein
(1)
Berk Sunar
(2)
Billy Bob Brumley
(2)
Bradley Morgan
(1)
Cesar Pereida García
(1)
Chitchanok Chuengsatiansup
(13)
Christina Garman
(2)
Christine van Vredendaal
(1)
Claudio Canella
(1)
Clémentine Maurice
(1)
Dallas McNeil
(1)
Damith Chinthana Ranasinghe
(2)
Daniel Genkin
(39)
Daniel Gruss
(6)
Daniel J. Bernstein
(1)
Daniel Katzman
(1)
Daniel Moghimi
(2)
David Mateos Romero
(1)
David Wong
(1)
David Wu
(1)
Diego F. Aranha
(1)
Eran Tromer
(2)
Eyal Ronen
(8)
Fangfei Liu
(2)
Felipe Rodrigues Novaes
(1)
Fergus Dall
(1)
Florian Sieck
(1)
Francesco Regazzoni
(1)
Frank Piessens
(3)
Frank Werner
(1)
Gabrielle De Micheli
(1)
Gal Horowitz
(2)
Gefei Li
(1)
Gernot Heiser
(1)
Gilles Barthe
(3)
Hovav Shacham
(2)
Hritvik Taneja
(1)
Ileana Buhan
(1)
Ingab Kang
(1)
Itamar Pipman
(1)
Jack Barnes
(1)
Jalen Chuang
(1)
Jann Horn
(2)
Jason Kim
(7)
Jiankai Jin
(1)
Jie Jeff Xu
(1)
Jo Van Bulck
(3)
Joachim Breitner
(1)
Jonas Juffinger
(1)
Jonathan Berger
(1)
Joop van de Pol
(3)
Julian Nowakowski
(1)
Katrina Falkner
(2)
Kevin Sam Tharayil
(1)
Lachlan Kang
(1)
Lejla Batina
(5)
Léo Weissbart
(2)
Leon Groot Bruinderink
(3)
Lev Pachmanov
(2)
Lishay Aben Sour
(1)
Lukas Giner
(1)
Lukasz Chmielewski
(3)
Luke Valenta
(1)
Madura A. Shelton
(2)
Marcel Böhme
(1)
Marco Guarnieri
(1)
Marcus Brinkmann
(1)
Marina Minkin
(4)
Mark Silberstein
(1)
Markus Wagner
(2)
Mehdi Tibouchi
(1)
Michael Schwarz
(5)
Mike Hamburg
(2)
Milos Prvulovic
(1)
Mingtian Tao
(1)
Monjur Alam
(1)
Moritz Lipp
(5)
Nadia Heninger
(4)
Naif Mehanna
(1)
Naomi Benger
(1)
Niels Samwel
(3)
Nigel P. Smart
(2)
Nureddin Kamadan
(1)
Ofir Weisse
(1)
Olaf Maennel
(1)
Olga Ohrimenko
(1)
Patrick Schaumont
(1)
Paul Grubbs
(1)
Paul Kocher
(2)
Paul Montague
(1)
Péter Horváth
(2)
Peter Pessl
(1)
Peter Schwabe
(3)
Pierre Laperdrix
(1)
Prateek Mittal
(1)
Qian Ge
(1)
Raoul Strackx
(1)
Riad S. Wahby
(1)
Robert Dumitru
(2)
Robert Gillham
(1)
Romain Poussier
(1)
Romain Rouvoy
(1)
Ron Magen
(1)
Ruby B. Lee
(1)
Rui Qi Sim
(3)
Sebastian Berndt
(1)
Shaanan Cohney
(1)
Shahar Paz
(1)
Shaked Yehezkel
(1)
Shing Hing William Cheng
(1)
Sioli O'Connell
(7)
Stefan Mangard
(2)
Stephan van Schaik
(7)
Sunjay Cauligi
(2)
Tanja Lange
(2)
Thomas Allan
(1)
Thomas Eisenbarth
(2)
Thomas F. Wenisch
(1)
Thomas Prescher
(2)
Thomas Ristenpart
(1)
Thomas Unterluggauer
(1)
Thomas Yurek
(1)
Thorben Moos
(1)
Toby Murray
(2)
Tomer Laor
(1)
Vitaly Dyadyuk
(1)
Walter Rudametkin
(1)
Walter Wang
(3)
Werner Haas
(2)
William Kosasih
(3)
Wolfgang Schoechl
(1)
Yaakov Cohen
(1)
Yang Su
(1)
Yarden Haskal
(1)
Yosef Meltser
(1)
Yossi Oren
(5)
Youssef Tobah
(1)
Yuanjing Zhao
(1)
Yusi Feng
(1)
Yuval Yarom
(67)
Zhiyuan Zhang
(5)
Ziyuan Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to