What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hovav Shacham
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome.
Sioli O'Connell
Lishay Aben Sour
Ron Magen
Daniel Genkin
Yossi Oren
Hovav Shacham
Yuval Yarom
2024
conf/sp
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression.
Yingchen Wang
Riccardo Paccagnella
Zhao Gang
Willy R. Vasquez
David Kohlbrenner
Hovav Shacham
Christopher W. Fletcher
2023
conf/uss
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Willy R. Vasquez
Stephen Checkoway
Hovav Shacham
2023
conf/uss
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Andrew Kwong
Walter Wang
Jason Kim
Jonathan Berger
Daniel Genkin
Eyal Ronen
Hovav Shacham
Riad S. Wahby
Yuval Yarom
2023
conf/sp
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
Yingchen Wang
Riccardo Paccagnella
Alan Wandke
Zhao Gang
Grant Garrett-Grossman
Christopher W. Fletcher
David Kohlbrenner
Hovav Shacham
2022
conf/uss
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
Yingchen Wang
Riccardo Paccagnella
Elizabeth Tang He
Hovav Shacham
Christopher W. Fletcher
David Kohlbrenner
2021
conf/uss
Swivel: Hardening WebAssembly against Spectre.
Shravan Narayan
Craig Disselkoen
Daniel Moghimi
Sunjay Cauligi
Evan Johnson
Zhao Gang
Anjo Vahldiek-Oberwagner
Ravi Sahita
Hovav Shacham
Dean M. Tullsen
Deian Stefan
2020
conf/uss
Retrofitting Fine Grain Isolation in the Firefox Renderer.
Shravan Narayan
Craig Disselkoen
Tal Garfinkel
Nathan Froyd
Eric Rahm
Sorin Lerner
Hovav Shacham
Deian Stefan
2018
conf/fc
Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model).
Hovav Shacham
2017
conf/uss
On the effectiveness of mitigations against floating-point timing channels.
David Kohlbrenner
Hovav Shacham
2017
conf/ndss
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.
Wilson Lian
Hovav Shacham
Stefan Savage
2016
journals/popets
On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction.
Steven Hill
Zhimin Zhou
Lawrence K. Saul
Hovav Shacham
2016
conf/ccs
A Systematic Analysis of the Juniper Dual EC Incident.
Stephen Checkoway
Jacob Maskiewicz
Christina Garman
Joshua Fried
Shaanan Cohney
Matthew Green
Nadia Heninger
Ralf-Philipp Weinmann
Eric Rescorla
Hovav Shacham
2016
conf/uss
Trusted Browsers for Uncertain Times.
David Kohlbrenner
Hovav Shacham
2015
conf/sp
On Subnormal Floating Point and Abnormal Timing.
Marc Andrysco
David Kohlbrenner
Keaton Mowery
Ranjit Jhala
Sorin Lerner
Hovav Shacham
2015
conf/ndss
Too LeJIT to Quit: Extending JIT Spraying to ARM.
Wilson Lian
Hovav Shacham
Stefan Savage
2014
conf/uss
Security Analysis of a Full-Body Scanner.
Keaton Mowery
Eric Wustrow
Tom Wypych
Corey Singleton
Chris Comfort
Eric Rescorla
J. Alex Halderman
Hovav Shacham
Stephen Checkoway
2014
conf/uss
On the Practical Exploitability of Dual EC in TLS Implementations.
Stephen Checkoway
Ruben Niederhagen
Adam Everspaugh
Matthew Green
Tanja Lange
Thomas Ristenpart
Daniel J. Bernstein
Jake Maskiewicz
Hovav Shacham
Matthew Fredrikson
2014
conf/ctrsa
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Theresa Calderon
Sarah Meiklejohn
Hovav Shacham
Brent Waters
2013
journals/joc
Compact Proofs of Retrievability.
Hovav Shacham
Brent Waters
2013
journals/joc
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2013
conf/uss
Measuring the Practical Impact of DNSSEC Deployment.
Wilson Lian
Eric Rescorla
Hovav Shacham
Stefan Savage
2013
conf/sp
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
Keaton Mowery
Michael Yung Chung Wei
David Kohlbrenner
Hovav Shacham
Steven Swanson
2013
conf/ctrsa
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
Karyn Benson
Hovav Shacham
Brent Waters
2012
conf/ccs
Are AES x86 cache timing attacks still feasible?
Keaton Mowery
Sriram Keelveedhi
Hovav Shacham
2011
conf/ccs
Eliminating fine grained timers in Xen.
Bhanu Chandra Vattikonda
Sambit Das
Hovav Shacham
2011
conf/ccs
Do you know where your cloud files are?
Karyn Benson
Rafael Dowsley
Hovav Shacham
2011
conf/uss
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Sarah Meiklejohn
Keaton Mowery
Stephen Checkoway
Hovav Shacham
2011
conf/uss
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
Karl Koscher
Alexei Czeskis
Franziska Roesner
Tadayoshi Kohno
2011
conf/eurocrypt
Careful with Composition: Limitations of the Indifferentiability Framework.
Thomas Ristenpart
Hovav Shacham
Thomas Shrimpton
2010
conf/ccs
Return-oriented programming without returns.
Stephen Checkoway
Lucas Davi
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Hovav Shacham
Marcel Winandy
2010
conf/ccs
An empirical study of privacy-violating information flows in JavaScript web applications.
Dongseok Jang
Ranjit Jhala
Sorin Lerner
Hovav Shacham
2010
conf/uss
OpenScan: A Fully Transparent Optical Scan Voting System.
Kai Wang
Eric Rescorla
Hovav Shacham
Serge J. Belongie
2010
conf/sp
Experimental Security Analysis of a Modern Automobile.
Karl Koscher
Alexei Czeskis
Franziska Roesner
Shwetak N. Patel
Tadayoshi Kohno
Stephen Checkoway
Damon McCoy
Brian Kantor
Danny Anderson
Hovav Shacham
Stefan Savage
2010
conf/asiacrypt
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
Sarah Meiklejohn
Hovav Shacham
David Mandell Freeman
2009
conf/ccs
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Thomas Ristenpart
Eran Tromer
Hovav Shacham
Stefan Savage
2009
conf/uss
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Stephen Checkoway
Ariel J. Feldman
Brian Kantor
J. Alex Halderman
Edward W. Felten
Hovav Shacham
2009
conf/crypto
Reconstructing RSA Private Keys from Random Key Bits.
Nadia Heninger
Hovav Shacham
2009
conf/crypto
Randomizable Proofs and Delegatable Anonymous Credentials.
Mira Belenkiy
Jan Camenisch
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Hovav Shacham
2009
conf/asiacrypt
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
2008
conf/ccs
When good instructions go bad: generalizing return-oriented programming to RISC.
Erik Buchanan
Ryan Roemer
Hovav Shacham
Stefan Savage
2008
conf/uss
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
J. Alex Halderman
Eric Rescorla
Hovav Shacham
David A. Wagner
2008
conf/asiacrypt
Compact Proofs of Retrievability.
Hovav Shacham
Brent Waters
2007
conf/ccs
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
Hovav Shacham
2007
conf/pkc
Efficient Ring Signatures Without Random Oracles.
Hovav Shacham
Brent Waters
2006
conf/ccs
Forward-secure signatures with untrusted update.
Xavier Boyen
Hovav Shacham
Emily Shen
Brent Waters
2006
conf/eurocrypt
Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2004
journals/joc
Short Signatures from the Weil Pairing.
Dan Boneh
Ben Lynn
Hovav Shacham
2004
conf/ccs
Group signatures with verifier-local revocation.
Dan Boneh
Hovav Shacham
2004
conf/ccs
On the effectiveness of address-space randomization.
Hovav Shacham
Matthew Page
Ben Pfaff
Eu-Jin Goh
Nagendra Modadugu
Dan Boneh
2004
conf/crypto
Short Group Signatures.
Dan Boneh
Xavier Boyen
Hovav Shacham
2004
conf/eurocrypt
Sequential Aggregate Signatures from Trapdoor Permutations.
Anna Lysyanskaya
Silvio Micali
Leonid Reyzin
Hovav Shacham
2003
conf/ndss
SiRiUS: Securing Remote Untrusted Storage.
Eu-Jin Goh
Hovav Shacham
Nagendra Modadugu
Dan Boneh
2003
conf/eurocrypt
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Dan Boneh
Craig Gentry
Ben Lynn
Hovav Shacham
2002
conf/ndss
Fast-Track Session Establishment for TLS.
Hovav Shacham
Dan Boneh
2001
conf/ctrsa
Improving SSL Handshake Performance via Batching.
Hovav Shacham
Dan Boneh
2001
conf/asiacrypt
Short Signatures from the Weil Pairing.
Dan Boneh
Ben Lynn
Hovav Shacham
Coauthors
Adam Everspaugh
(1)
Ahmad-Reza Sadeghi
(1)
Alan Wandke
(1)
Alexandra Dmitrienko
(1)
Alexei Czeskis
(2)
Amit Sahai
(2)
Andrew Kwong
(1)
Anjo Vahldiek-Oberwagner
(1)
Anna Lysyanskaya
(2)
Ariel J. Feldman
(1)
Ben Lynn
(3)
Ben Pfaff
(1)
Bhanu Chandra Vattikonda
(1)
Brent Waters
(8)
Brian Kantor
(3)
Chris Comfort
(1)
Christina Garman
(1)
Christopher W. Fletcher
(3)
Corey Singleton
(1)
Craig Disselkoen
(2)
Craig Gentry
(1)
Damon McCoy
(2)
Dan Boneh
(9)
Daniel Genkin
(2)
Daniel J. Bernstein
(1)
Daniel Moghimi
(1)
Danny Anderson
(2)
David A. Wagner
(1)
David Kohlbrenner
(7)
David Mandell Freeman
(1)
Dean M. Tullsen
(1)
Deian Stefan
(2)
Dongseok Jang
(1)
Edward W. Felten
(1)
Elizabeth Tang He
(1)
Emily Shen
(1)
Eran Tromer
(1)
Eric Rahm
(1)
Eric Rescorla
(5)
Eric Wustrow
(1)
Erik Buchanan
(1)
Eu-Jin Goh
(2)
Evan Johnson
(1)
Eyal Ronen
(1)
Franziska Roesner
(2)
Gil Segev
(1)
Grant Garrett-Grossman
(1)
Hovav Shacham
(57)
J. Alex Halderman
(3)
Jacob Maskiewicz
(1)
Jake Maskiewicz
(1)
Jan Camenisch
(1)
Jason Kim
(1)
Jonathan Berger
(1)
Joshua Fried
(1)
Kai Wang
(1)
Karl Koscher
(2)
Karyn Benson
(2)
Keaton Mowery
(5)
Lawrence K. Saul
(1)
Leonid Reyzin
(1)
Lishay Aben Sour
(1)
Lucas Davi
(1)
Marc Andrysco
(1)
Marcel Winandy
(1)
Markulf Kohlweiss
(1)
Matthew Fredrikson
(1)
Matthew Green
(2)
Matthew Page
(1)
Melissa Chase
(1)
Michael Yung Chung Wei
(1)
Mihir Bellare
(1)
Mira Belenkiy
(1)
Moni Naor
(1)
Nadia Heninger
(2)
Nagendra Modadugu
(2)
Nathan Froyd
(1)
Rafael Dowsley
(1)
Rafail Ostrovsky
(2)
Ralf-Philipp Weinmann
(1)
Ranjit Jhala
(2)
Ravi Sahita
(1)
Riad S. Wahby
(1)
Riccardo Paccagnella
(3)
Ron Magen
(1)
Ruben Niederhagen
(1)
Ryan Roemer
(1)
Sambit Das
(1)
Sarah Meiklejohn
(3)
Scott Yilek
(1)
Serge J. Belongie
(1)
Shaanan Cohney
(1)
Shravan Narayan
(2)
Shwetak N. Patel
(1)
Silvio Micali
(1)
Sioli O'Connell
(1)
Sorin Lerner
(3)
Sriram Keelveedhi
(1)
Stefan Savage
(7)
Stephen Checkoway
(9)
Steve Lu
(2)
Steven Hill
(1)
Steven Swanson
(1)
Sunjay Cauligi
(1)
Tadayoshi Kohno
(2)
Tal Garfinkel
(1)
Tanja Lange
(1)
Theresa Calderon
(1)
Thomas Ristenpart
(4)
Thomas Shrimpton
(1)
Tom Wypych
(1)
Walter Wang
(1)
Willy R. Vasquez
(2)
Wilson Lian
(3)
Xavier Boyen
(2)
Yingchen Wang
(3)
Yossi Oren
(1)
Yuval Yarom
(2)
Zhao Gang
(3)
Zhimin Zhou
(1)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to